Information Systems Journal最新文献

筛选
英文 中文
ICTs and Rural E-Governance: From Digital Design to Public Policy 信息通信技术与农村电子政务:从数字设计到公共政策
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-08-08 DOI: 10.1111/isj.70012
Ning Su, Fu Jia, Jeff, Shan L. Pan, Carol Hsu
{"title":"ICTs and Rural E-Governance: From Digital Design to Public Policy","authors":"Ning Su, Fu Jia, Jeff, Shan L. Pan, Carol Hsu","doi":"10.1111/isj.70012","DOIUrl":"https://doi.org/10.1111/isj.70012","url":null,"abstract":"<p>Over the past three decades, information and communication technologies (ICTs) have significantly shaped the emergence and evolution of public organisations and public policies worldwide. The rapid advancement of ICTs has contributed to e-governance, which broadly comprises the use of ICTs for government administration, public services, stakeholder engagement and other activities. According to the United Nations' E-Government Survey in 2024, diverse regions around the world have been increasingly leveraging ICTs to enhance government services, whereas ‘[t]he rapid digitalization of services, the shift towards remote work, the integration of artificial intelligence (AI), the emphasis on digital identity and data management, and the increased use of data and emerging technologies for policymaking are key global megatrends’ (United Nations <span>2024</span>, xxi).</p><p>Despite the adoption of ICTs in the public sector and advancement in e-governance, rural communities remain underserved in today's digital age (United Nations <span>2024</span>) and to some extent understudied in the e-governance literature. Today, over 40% of the world's population lives in rural areas (United Nations <span>2018</span>; World Bank <span>2024</span>), including regions with limited resources and insufficient infrastructure, potentially posing significant challenges for public service and socioeconomic development. ICTs present unique value propositions and promises, as well as risks and challenges. The opportunities are especially salient in areas such as the expansion of rural communities' access to digital infrastructure, innovation in agriculture and enhancement of food security, deployment of healthcare applications and services, contribution to gender equality, reduction of inequality including the digital divide, promotion of education and employment, sustainable development and protection of endangered animals (ITU <span>2021</span>).</p><p>Reflecting the multifaceted and complex nature of e-governance, research from multiple fields, including public policy, rural studies, development sociology, development economics and information systems (IS), has explored related topics (e.g., Banerjee et al. <span>2020</span>; Dawes <span>2008</span>; Salemink et al. <span>2017</span>; Slavova and Metiu <span>2022</span>; Xiao et al. <span>2013</span>). Among these fields, IS, with its focus on technology, is potentially uniquely positioned to generate nuanced and valuable insights into the role of ICTs in enabling and improving public services. The findings from the IS literature have demonstrated and detailed how different forms of ICTs, from established technologies, such as mainframes, desktops, the Internet and cellular services, to emerging technologies, such as cloud, mobile applications, Internet of Things, blockchain, metaverse and AI, have increasingly been operating as an occasion for interaction among governments, public-sector organisations, individuals, f","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"350-363"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.70012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Identity Wallets: A Guide to the EU’s New Identity Model 数字身份钱包:欧盟新身份模式指南
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-08-06 DOI: 10.1111/isj.70009
Andre Kudra, Alexander Rieger, Johannes Sedlmeir, Tamara Roth, Gilbert Fridgen, Amber Young
{"title":"Digital Identity Wallets: A Guide to the EU’s New Identity Model","authors":"Andre Kudra,&nbsp;Alexander Rieger,&nbsp;Johannes Sedlmeir,&nbsp;Tamara Roth,&nbsp;Gilbert Fridgen,&nbsp;Amber Young","doi":"10.1111/isj.70009","DOIUrl":"https://doi.org/10.1111/isj.70009","url":null,"abstract":"<p>By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far-reaching implications for how public and private sector organisations interact with their users—some evident, others less. In this paper, we synthesise several years of pioneering experience with the wallet-based model to understand its opportunities and challenges. We discuss how the model can not only streamline organisational identity and access management but also generate broader value for organisational processes. We then unpack the challenges that come with its implementation and navigating the emerging wallet ecosystem. We conclude with a step-by-step guide for successfully implementing the wallet-based model.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"340-349"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.70009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Rural Information Systems Initiatives for Institutional Change Can Aggravate Inequalities: An Affordance-Based Institutional Logics Perspective 农村信息系统制度变革如何加剧不平等:一个基于能力的制度逻辑视角
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-11-05 DOI: 10.1111/isj.70018
Pragyan Thapa, Devinder Thapa, Øystein Sæbø
{"title":"How Rural Information Systems Initiatives for Institutional Change Can Aggravate Inequalities: An Affordance-Based Institutional Logics Perspective","authors":"Pragyan Thapa,&nbsp;Devinder Thapa,&nbsp;Øystein Sæbø","doi":"10.1111/isj.70018","DOIUrl":"https://doi.org/10.1111/isj.70018","url":null,"abstract":"<div>\u0000 \u0000 <p>Rural information systems initiatives (RISIs) are ICT-based projects intended to drive institutional change and reduce inequalities in rural communities. However, the extant information systems literature shows that many such initiatives paradoxically aggravate inequalities in other domains, but the literature provides little theoretical explanation of the mechanisms involved. This study addresses this gap from an affordance-based institutional logics perspective. Specifically, it conceptualizes a RISI as an institution that embodies a dominant institutional logic, which shapes how technology affordances are perceived and enacted. This lens is applied to an interpretive case study of an e-governance initiative implemented in village municipalities (i.e., village councils) in Nepal aimed at reducing knowledge inequalities in the municipalities. The initiative introduced a self-assessment logic for evaluating local development work, which amplified existing knowledge and power inequalities over time. The case study surfaced two mechanisms through which RISIs may aggravate inequalities: (1) by impeding logic hybridization and (2) by activating discriminatory logics. These findings contribute to the theoretical understanding of RISIs and provide critical insights into the design and governance of ICT-based initiatives in rural contexts.</p>\u0000 </div>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"457-483"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Culture Clash of AI Adoption in Lean Quality Management. Resolving the Tensions at Siemens Electronics Works Amberg 精益质量管理中人工智能应用的文化冲突。解决安贝格西门子电子工厂的紧张局势
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-08-05 DOI: 10.1111/isj.70006
Benjamin van Giffen, Gunter Beitinger, Helmuth Ludwig, Bill Schiano, Konstantin Schmidt, Jan vom Brocke
{"title":"The Culture Clash of AI Adoption in Lean Quality Management. Resolving the Tensions at Siemens Electronics Works Amberg","authors":"Benjamin van Giffen,&nbsp;Gunter Beitinger,&nbsp;Helmuth Ludwig,&nbsp;Bill Schiano,&nbsp;Konstantin Schmidt,&nbsp;Jan vom Brocke","doi":"10.1111/isj.70006","DOIUrl":"https://doi.org/10.1111/isj.70006","url":null,"abstract":"<p>Artificial intelligence (AI) brings great potential for manufacturers, but clashes with the established culture due to the unexplainable and opaque nature of the solutions it provides. Having little experience in AI and machine learning (ML), most manufacturing leaders experience barriers implementing AI. This is especially true in lean environments, since these are often nearly perfected and hence intolerant of failure. Cultural barriers to adoption abound, even if the quality of the AI is assured. Deeply grounded in the case of Siemens' Digital Industries division, this 5-year practitioner research investigates AI adoption in lean quality management. Collaborating with key executives involved in the case and fellow researchers, we investigate the challenges and solutions of AI adoption in lean quality management. We identify three distinct paradoxes: (1) Human-driven versus AI-driven analysis, decisions and actions, (2) transparency versus opacity and (3) specification-driven versus discovery-driven processes to achieve quality. Rooted in Siemens' experience, we derive four strategies for overcoming these paradoxes. Our findings have important implications for practice, as we present clear and realistic steps and guidance for effective AI integration into lean quality management environments. Our results contribute to the discourse on AI adoption, pointing to the importance of recognising potential cultural clashes as well as strategies for overcoming these which go beyond the technology itself.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"315-339"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certification of Open Source Software Compliance: Insights From a Conjoint Experiment 开源软件合规认证:来自联合实验的见解
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-08-27 DOI: 10.1111/isj.70014
Michael A. Zaggl, Jörn Block, Juliane Wissel
{"title":"Certification of Open Source Software Compliance: Insights From a Conjoint Experiment","authors":"Michael A. Zaggl,&nbsp;Jörn Block,&nbsp;Juliane Wissel","doi":"10.1111/isj.70014","DOIUrl":"https://doi.org/10.1111/isj.70014","url":null,"abstract":"<p>Open source software (OSS) is becoming increasingly crucial for companies as they use OSS components in a wide range of products, including cars, smart-home equipment, and many more, as well as in their internal processes. However, OSS comes with regulations and licensing conditions with which companies need to comply. This complicates the company's software acquisition and hinders the broader diffusion of OSS. In this paper, we study a novel approach that could reduce or overcome barriers to software acquisition in business-to-business transactions: the certification of software suppliers for OSS compliance based on the ISO 5230 regulatory standard. This standard specifies OSS compliance and, in addition to third-party certification involving an auditor, allows suppliers to self-certify. Building on institution-based trust and signalling theory, we hypothesise that a supplier's OSS compliance certification is a critical selection criterion for companies acquiring software. Specifically, we expect that self-certification constitutes a valuable signal influencing the selection decision, although we expect it to be weaker than third-party certification. We further hypothesise that the acquirer's awareness of the standard strengthens the effect of self-certification and that their perceived OSS procurement risk strengthens the impact of third-party certification. Using a discrete choice-based conjoint experiment, we find evidence supporting our hypotheses and demonstrate that self-certification can be a viable substitute for third-party certification. Our study contributes to the understanding of the diffusion and adoption of OSS, extends signalling theory by comparing self-certification with third-party certification, and extends the information systems literature on institution-based trust.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"386-409"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.70014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Art of Crafting an Enticing Opening Gambit 制作诱人开局的艺术
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2026-02-02 DOI: 10.1111/isj.70033
Robert M. Davison
{"title":"The Art of Crafting an Enticing Opening Gambit","authors":"Robert M. Davison","doi":"10.1111/isj.70033","DOIUrl":"https://doi.org/10.1111/isj.70033","url":null,"abstract":"&lt;p&gt;Although its origins lie in the Italian verb &lt;i&gt;gambetto&lt;/i&gt; (to trip someone up) and its more common usage in chess refers to making a sacrifice in order to gain an advantage, the metaphorical use of gambit, specifically an opening gambit, refers to the opening sentences of a document, and perhaps also the title, which are intended to ‘hook’ the reader. Such hooking is important because it provides the author with the opportunity to engage the audience. I hope that my opening sentence has similarly hooked your attention!&lt;/p&gt;&lt;p&gt;The range of genres of such gambits is broad, varying from the trivial or mundane (‘previous research has shown that’) through the descriptive (‘in this paper, we …’), to the bibliographical (‘over the last twenty years, huge volumes of research have been published on …’). A gambit could pose a problem, identify an apparent contradiction that the author plans to explore, ask a question, or speculate about the future. Some of these genres are more creative: they seem designed to jolt the reader out of the customary comfort zone and into a new realm where a more sophisticated understanding of a situation can be gleaned. Opening gambits thus have, at least potentially, immense epistemic power, but quite what the impact of that application of power will be is never entirely certain. Indeed, different readers may interpret your opening sentence(s) in very different ways. Thus, you may capture the imagination of some readers who instantly want to know more. However, you may simultaneously annoy other readers irredeemably, for instance, if they find your style rebarbative, and still others may wander in a limbo between ‘Ah, that's an intriguing idea but, …’, ‘Hmm, who cares’ and ‘No, I don't think so’.&lt;/p&gt;&lt;p&gt;Since the very first readers of a paper are the editors and reviewers, if they are unimpressed by your opening gambit, they may request or insist that you change it. As Gerhard Schwabe relates,&lt;sup&gt;1&lt;/sup&gt; ‘The most difficult genre for me has been curious or provocative questions. Although I liked them, none of them survived the reviewing. … The reviewers asked me to adhere to the norms of scientific writing’. Thus, the open-mindedness of editors and reviewers, and perhaps the cultural values of the journal, also determine the extent to which opening gambits can transcend the mundane, or the putative norms of ‘scientific writing’, whatever that is.&lt;/p&gt;&lt;p&gt;I suggest that creating the opening gambit, and getting it just right so that it entices but does not alienate, is very much an art. In an earlier editorial (Davison &lt;span&gt;2023&lt;/span&gt;), I examined a similar art, that of title crafting, and have also alluded to it in editorials on iconoclasm (Davison &lt;span&gt;2020&lt;/span&gt;), and storytelling (Davison &lt;span&gt;2016&lt;/span&gt;), among others. As Schwabe et al. (&lt;span&gt;2019&lt;/span&gt;) observe in an editorial to introduce a special issue of this journal on storytelling, ‘stories can be used to connect people, persuade and inform them’. I sugge","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"313-314"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.70033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147687026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Trust in Decision-Support Artificial Intelligence: A Boundary Spanning Perspective 在决策支持人工智能中建立信任:跨界视角
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-10-07 DOI: 10.1111/isj.70015
Miao Cui, Wanling Li, Ken Kamoche
{"title":"Building Trust in Decision-Support Artificial Intelligence: A Boundary Spanning Perspective","authors":"Miao Cui,&nbsp;Wanling Li,&nbsp;Ken Kamoche","doi":"10.1111/isj.70015","DOIUrl":"https://doi.org/10.1111/isj.70015","url":null,"abstract":"<div>\u0000 \u0000 <p>Decision-support artificial intelligence (AI) has become an essential technology for firms aiming to increase their business development by optimising strategic decisions. However, unlike other information technologies, decision-support AI often operates as a ‘black box’, which can erode trust. The current understanding of information technology trust faces challenges when attempting to explain the role of trust in decision-support AI when formulating business strategies. This study explores how firms can develop trust in decision-support AI for the formulation of business strategies. By adopting a boundary-spanning perspective, the research introduces a three-stage model that outlines specific strategies, processes, and outcomes at each stage to nurture trust in decision-support AI. This study contributes to the existing literature on AI trust by proposing an approach for building organisational trust in decision-support AI and to technology trust theory by emphasising the iterative and concurrent dynamics of trust and usage within the realm of decision-support AI, as well as the interactive capability of organisations with decision-support AI. Additionally, it enriches the boundary-spanning literature by offering a planned view on decision-support AI trust development.</p>\u0000 </div>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"435-456"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heeding the Messenger: The Influence of Sender Characteristics on Security Message Compliance Intentions 关注信使:发送者特征对安全消息遵从意图的影响
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-09-22 DOI: 10.1111/isj.70013
Sebastian Walter Schuetz, Gaurav Bansal, Qin Weng, Paul Benjamin Lowry, Jason Bennett Thatcher
{"title":"Heeding the Messenger: The Influence of Sender Characteristics on Security Message Compliance Intentions","authors":"Sebastian Walter Schuetz,&nbsp;Gaurav Bansal,&nbsp;Qin Weng,&nbsp;Paul Benjamin Lowry,&nbsp;Jason Bennett Thatcher","doi":"10.1111/isj.70013","DOIUrl":"https://doi.org/10.1111/isj.70013","url":null,"abstract":"<div>\u0000 \u0000 <p>How security messages can be used to motivate information technology (IT) users' security behaviour has been of keen interest to IS research. To that end, studies have focused on the content of security messages; however, few studies have examined the influence of message senders. In this article, we build on social influence theory and integrate it with the concept of inferences of manipulative intent (IMI) to develop a model that examines how perceptions of sender characteristics—cybersecurity expertise, coercive power, and similarity—can yield positive and negative influence on message outcomes, captured in recipients' message compliance intentions. We test our model in four different studies using field and scenario experiments across three target populations: the general public, students, and employees. Perceived expertise, power, and similarity had similar effects among the general public and students: Perceived expertise was positively associated with message outcomes, but perceived power and similarity were negatively associated. In contrast, employees reacted differently from the general public and students in that they responded positively to perceived power, with perceived expertise and similarity having negligible effects. Across these three target populations, we found that participants reacted to senders high in perceived power and similarity with IMI, which reduced their message compliance intentions. Our results suggest that senders must be chosen carefully, depending on the target population, because selecting the wrong sender can increase the likelihood of a message being rejected.</p>\u0000 </div>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"410-434"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda 富有同情心的数字创新:多元视角和研究议程
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-08-25 DOI: 10.1111/isj.70003
Raffaele F. Ciriello, Lars Mathiassen, Marten Risius, Marc Cheong, Helana Scheepers, Emmanuelle Vaast
{"title":"Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda","authors":"Raffaele F. Ciriello,&nbsp;Lars Mathiassen,&nbsp;Marten Risius,&nbsp;Marc Cheong,&nbsp;Helana Scheepers,&nbsp;Emmanuelle Vaast","doi":"10.1111/isj.70003","DOIUrl":"https://doi.org/10.1111/isj.70003","url":null,"abstract":"<p>Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems. In response, this paper presents a problematization review that critiques and revises three widely held assumptions about digital innovations: (1) that they generate net benefits that outweigh the associated harm; (2) that their ethicality can be calculated through utility and (3) that their harms can be mitigated through technological, corporate or regulatory intervention. We argue that compassion provides a pluralistic ethical foundation that integrates the strengths of consequentialism, deontology, and virtue ethics. This framework prioritises serving <i>all</i> stakeholders, especially the most vulnerable, while avoiding harm. It sets a research agenda focused on addressing structural dysfunctions, amplifying marginalised voices, and fostering sustainable systems. By reimagining digital innovation as a force for the common good, this paper contributes to a more just and equitable digital future for all.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"364-385"},"PeriodicalIF":6.3,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.70003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI Is Neither Just Another IT Artefact nor a Colleague: Methodological Guidance for IS Scholarship 生成人工智能既不是另一个IT人工制品,也不是一个同事:Is奖学金的方法论指导
IF 6.3 2区 管理学
Information Systems Journal Pub Date : 2025-12-25 DOI: 10.1111/isj.70027
Kai Riemer, Sandra Peter, Gerhard Schwabe, Sutirtha Chatterjee, Martin Adam, Robert M. Davison
{"title":"Generative AI Is Neither Just Another IT Artefact nor a Colleague: Methodological Guidance for IS Scholarship","authors":"Kai Riemer,&nbsp;Sandra Peter,&nbsp;Gerhard Schwabe,&nbsp;Sutirtha Chatterjee,&nbsp;Martin Adam,&nbsp;Robert M. Davison","doi":"10.1111/isj.70027","DOIUrl":"https://doi.org/10.1111/isj.70027","url":null,"abstract":"&lt;p&gt;There is immense hype around the use and application of generative AI (GenAI) technologies. Following the public release of ChatGPT in late 2022, and the subsequent proliferation of new technologies based on large language models (LLMs), we have witnessed an explosion of interest in how these technologies might transform organisations, work practices and society at large. Not surprisingly, we are seeing increasing numbers of submissions that study the application of this technology, in contexts as diverse as customer service, knowledge work, creative industries, healthcare and education. While the breadth of application domains is remarkable, the depth of engagement with the technology under study unfortunately often tends to be superficial.&lt;/p&gt;&lt;p&gt;Many submissions to Information Systems (IS) journals suffer simultaneously from a range of common misconceptions about generative AI technologies, and relatedly from a lack of specific background about how this technology works. Without clearly articulating the specific conceptualisation of the particular technology under study, for example, what makes it distinct from other IT artefacts, any conclusions drawn from the research and any associated theorising risk being built on shaky foundations. When the IT artefact at the centre of the study remains vaguely defined (e.g., ‘this paper studies AI’) or is treated as a black box, it becomes difficult to assess whether the findings are genuinely novel, whether they might apply to other AI or technologies, or whether the theoretical contributions are as significant as claimed, or even whether the paper has a true connection to IS.&lt;/p&gt;&lt;p&gt;We see a number of misconceptions about generative AI in submitted manuscripts. These generally fall into one of two camps, each making a category error that undermines the research's potential contribution.&lt;/p&gt;&lt;p&gt;To understand why these misconceptions are problematic, and to appreciate what is genuinely novel about GenAI, we should establish some foundational understanding of how the technology actually works.&lt;/p&gt;&lt;p&gt;At the heart of a GenAI technology is the AI model, a large language model or foundation model (Feuerriegel et al. &lt;span&gt;2023&lt;/span&gt;; Schneider et al. &lt;span&gt;2023&lt;/span&gt;), that is based on a deep neural network, typically using the transformer architecture (Vaswani et al. &lt;span&gt;2017&lt;/span&gt;). The AI model is derived from a training process with large amounts of training data, whereby patterns contained in the data are encoded into a numeric structure, called the latent space (Asperti and Tonelli &lt;span&gt;2023&lt;/span&gt;). This latent space can be thought of as a probability distribution over all the relationships between all possible words, which encodes any possible, nuanced language patterns present in the training data.&lt;/p&gt;&lt;p&gt;Importantly, any output is generated from these patterns; no information or data in any conventional sense (akin to a database) is stored in the model. This contrasts markedly with conventiona","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 2","pages":"161-165"},"PeriodicalIF":6.3,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.70027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146155111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书