{"title":"A typology of disinformation intentionality and impact","authors":"Aaron French, Veda C. Storey, Linda Wallace","doi":"10.1111/isj.12495","DOIUrl":"10.1111/isj.12495","url":null,"abstract":"<p>In contemporary society, the increased reliance on social media as a vital news source has facilitated the spread of disinformation that has potential polarising effects. Disinformation, false information deliberately crafted to deceive recipients, has escalated to the extent that it is now acknowledged as a significant cybersecurity concern. To proactively tackle this issue, and minimise the risk of negative outcomes associated with disinformation, this research presents a typology of disinformation intentionality and impact (DII) to understand the intentionality and impact of disinformation threats. The typology draws upon information manipulation theory and risk management principles to evaluate the potential impact of disinformation campaigns with respect to their virality and polarising impact. The intentionality of disinformation spread is related to its believability among susceptible consumers, who are likely to propagate the disinformation to others if they assess it to be believable. Based on the dimensions of intentionality and impact, the DII typology can be used to categorise disinformation threats and identify strategies to mitigate its risk. To illustrate its utility for evaluating the risk posted by disinformation campaigns, the DII typology is applied to a case study. We propose risk mitigation strategies as well as recommendations for addressing disinformation campaigns spread through social media platforms.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138958606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luca Gastaldi, Francesco Paolo Appio, Daniel Trabucchi, Tommaso Buganza, Mariano Corso
{"title":"From mutualism to commensalism: Assessing the evolving relationship between complementors and digital platforms","authors":"Luca Gastaldi, Francesco Paolo Appio, Daniel Trabucchi, Tommaso Buganza, Mariano Corso","doi":"10.1111/isj.12491","DOIUrl":"10.1111/isj.12491","url":null,"abstract":"<p>Digital platforms are increasingly dominating markets by bringing together two or more groups of users and facilitating the exchange of value between them. Although several significant issues concerning the dynamics of digital platforms have been addressed, much of the research effort has focused on the platform owner. On the other hand, research on complementors neither takes into account the individual level nor clearly shows what an individual complementor can do to benefit from platform participation. By studying the evolving relationship between YouTube and its ecosystem of complementors (content creators), we shed light on the strategies that complementors use to progressively avoid but still benefit from platform governance. We find that content creators are, first, in a mutual relationship with the YouTube platform, benefiting from direct monetization. Then, they shift to commensalism as the relationship evolves, allowing them to avoid YouTube's governance and take advantage of multi-homing. Our findings illuminate the effects of platform governance, particularly how it shapes the actions of complementors.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138593869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robert M. Davison, Rens Scheepers, Stefan Henningsson, Stan Karanasios
{"title":"The virtue of brevity","authors":"Robert M. Davison, Rens Scheepers, Stefan Henningsson, Stan Karanasios","doi":"10.1111/isj.12492","DOIUrl":"10.1111/isj.12492","url":null,"abstract":"<p>Before the rise of online-only publishing, journals, including the ISJ, operated with page budgets, which determined the annual limit of pages that could be published. A decade ago, at the ISJ, this amounted to some 576 journal pages. However, with the advent of online-only publishing, the concept of a page budget has disappeared. The total number of pages increased gradually, at first to 666, to 800 and then it jumped to over 1000. Wiley, the publisher of the ISJ, has informed us that there is no limit at all to how many pages (or articles) we can publish a year, so long as quality standards are maintained. In 2023, the ISJ published 43 research articles, 8 editorials and 3 book reviews, a total of 1458 journal pages or 253% of the pre-online-only model. We expect that in future these numbers will continue to rise.</p><p>Not only has the number of accepted articles increased but also has their length. It used to be the case that we requested authors to keep within 8000 words. This was supposed to be an all-inclusive word count from title to references and appendices. With the passing of time, the restrictions of paper length have largely disappeared. Table 1 below presents the guidance given to authors for the AIS Senior Scholars' List of Premier Journals as well as several others. While there is some wiggle room, the general guidance tends to sit within the 8000- to 12 000-word range, or 38–55 pages. This is similar to adjacent fields: the <i>Academy of Management Journal</i> allows 40 double-spaced pages including references, tables, figures and appendices,1 and Organisation Studies permits up to 13 000 words encompassing references, tables, figures and appendices.2 Computer Science journals tend to publish briefer papers. For instance, IEEE Transactions on Pattern Analysis and Machine Intelligence allows 35 double spaced pages3 and IEEE Communications Surveys & Tutorials charges authors $220 for per page over 30 pages (up to 8 pages).4</p><p>Today it is not unusual for a first-round submission to be in the 12 000-word range and for a finally accepted article to be 15 000. Even 20 000-word epics are by no means unheard of. Why all this verbosity? One reason is that authors and reviewers get trapped in what we call a text-accumulation trap. Authors submit papers with as much information as possible, hoping to instil confidence in the review team as to its completeness, as well as to prepare for both expected and unexpected reviewer demands. Reviewers then read the paper, yet ask for even more detail, and authors feel obliged to respond in kind. Over multiple revision cycles, satisfying all the reviewers requires ever more words. Reviewers should be mindful of the text-accumulation trap. When requesting authors to incorporate large amounts of new material, it is necessary to weigh the value of this extra material against the risk of unnecessarily bloating the manuscript.</p><p>In addition, it is easier to write more than less, easier to i","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12492","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139207329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From web forms to chatbots: The roles of consistency and reciprocity for user information disclosure","authors":"Martin Adam, Alexander Benlian","doi":"10.1111/isj.12490","DOIUrl":"10.1111/isj.12490","url":null,"abstract":"<p>Interactive decision aids (IDAs) on websites often require users to disclose relevant information (e.g., preferences, contact information) to help users in making decisions (e.g., product choice). With technological advances in IDAs, websites increasingly switch from static, non-conversational IDAs (e.g., web forms) to conversational ones (e.g., chatbots) to boost user information disclosure that nurtures the websites' economic viability. While this novel form of IDAs is already widely employed in practice, information systems research has yet to examine the defining dialogue design features of conversational IDAs and their effects on eliciting user information. Drawing on persuasion theory and particularly on consistency and reciprocity as influence techniques, we develop a research model around two crucial dialogue design features of conversational IDAs. Specifically, we investigate the distinct and joint effects of conversational style (i.e., absence vs. presence of a conversational presentation of requests) and reciprocation triggers (i.e., absence vs. presence of reciprocity-inducing information) on user information disclosure (i.e., email addresses). By combining the complementary properties of a randomised field experiment (<i>N</i> = 386) and a follow-up online experiment (<i>N</i> = 182), we empirically provide evidence in support of the distinct and joint effects of conversational style and reciprocation triggers of IDAs on user information disclosure. Moreover, we demonstrate that these dialogue design features have indirect effects on information disclosure via perceptions of social presence and privacy concerns. Thus, our paper provides theoretical and practical insights into whether, how, and why critical IDA dialogue design features can better elicit user information for website services.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12490","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139226418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feng Xu, Carol Hsu, Tawei (David) Wang, Paul Benjamin Lowry
{"title":"The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation","authors":"Feng Xu, Carol Hsu, Tawei (David) Wang, Paul Benjamin Lowry","doi":"10.1111/isj.12488","DOIUrl":"10.1111/isj.12488","url":null,"abstract":"<p>Organisational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever-increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organisational security problems. This study therefore focuses on employees' proactive <i>information security behaviours</i> (ISBs)—behaviours that are self-initiated, change-oriented, and future-focused—and the motivations that compel employees to protect organisational assets. We ground our study in Parker et al. (2010) proactive motivation theory (ProMT) and develop an integrated multilevel model to examine the respective effects of proactive motivational states, that is, <i>can-do</i>, <i>reason-to</i>, and <i>energised-to</i> motivations, on employees' proactive ISBs. We also explore the roles of individual differences and contextual factors—namely, proactive personality and supervisory ISec support—and their influences on proactive motivational states. Data were collected from 210 employees situated in 55 departments distributed among multiple organisations located in China. The results show that supervisory ISec support positively influences employees' proactive motivational states and thereby boosts employees' proactive ISBs. Proactive personality negatively moderates the effect of supervisory ISec support on flexible security role orientation (reason-to motivation). By identifying the antecedents of employees' proactive ISBs, we make key theoretical contributions to ISec research and valuable practical contributions to organisational ISec management.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12488","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139249660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical investigation of social comparison and open source community health","authors":"Kevin Lumbard, Matt Germonprez, Sean Goggins","doi":"10.1111/isj.12485","DOIUrl":"10.1111/isj.12485","url":null,"abstract":"<p>It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accountability mobilization, guanxi and social media-induced polarization: Understanding the bystander's prosocial punishment to misinformation spreader","authors":"Zhe Zhu, Nan Zhang, Meiwen Ding, Lei Chen","doi":"10.1111/isj.12486","DOIUrl":"10.1111/isj.12486","url":null,"abstract":"<p>Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrew Hardin, Robert M. Davison, Christoph Schneider, Clayton A. Looney, Suprateek Sarker
{"title":"Contextualising collective efficacy in virtual team research: The essential role of collaborative technologies in the virtual team efficacy conceptual framework","authors":"Andrew Hardin, Robert M. Davison, Christoph Schneider, Clayton A. Looney, Suprateek Sarker","doi":"10.1111/isj.12484","DOIUrl":"10.1111/isj.12484","url":null,"abstract":"<p>One factor receiving contemporary interest from virtual team researchers is collective-level efficacy, that is, a team's shared belief in its collective abilities to work effectively. However, our understanding of this literature leads to two concerns. First, depending on traditional team-focused collective-level efficacy concepts conveys an indifferent view of technology that ignores decades of research explaining how virtual teams' reliance on collaborative technologies differentiates them from traditional teams. Second, the information systems literature has largely ignored the concept of collective-level efficacy in virtual team research. That collective-level efficacy is underexamined in IS research is disappointing, given the growing recognition (outside the IS literature) that it is crucial to virtual team success. This absence becomes even more concerning given that IS researchers developed the concept of virtual team efficacy (VTE) specifically for virtual team settings. Unlike collective-level efficacy measures designed for traditional team settings, VTE incorporates technology into its conceptual definition and the operationalization of its measurement indicators. Thus, it is a stronger predictor of virtual team outcomes. To demonstrate its importance to IS research, we used a deductive theory-driven approach to propose and empirically evaluate whether VTE indirectly acts on virtual team effectiveness through the critical concepts of trust and participants' perceptions of problems associated with the collaboration inhibitors of time difference, geographical separation, and cultural differences. This research contributes significantly to the literature by confirming VTE's relationship to important virtual team success factors and informing IS researchers about the appropriate choice of constructs when studying collective-level efficacy in virtual team settings.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agentic interplay between hybridity and liminality in contemporary boundary work","authors":"Petros Chamakiotis, Gillian Symon, Rebecca Whiting","doi":"10.1111/isj.12477","DOIUrl":"10.1111/isj.12477","url":null,"abstract":"<p>There is no doubt that digital technologies have an impact on boundary work, that is, the practices individuals develop to work up boundaries between ‘work’ and ‘life’. However, related research is still dominated by the integration–segmentation framework which may restrict our understanding of contemporary practice. To address this limitation, we use the concepts of hybridity (fusion) and liminality (in-betweenness) in combination to explore how their interplay may promote more nuanced accounts of how individuals work up their boundaries in contemporary everyday life. Our analysis of video diaries and follow-up interviews undertaken by 30 UK-based workers reveals an ‘agentic interplay’ of hybridity and liminality that is understood as an ongoing dynamic practice, sometimes <i>enabling</i> and sometimes <i>undermining</i> desired boundary work outcomes. We make three contributions, collectively offering a critical advancement in the work–life debate and the hybridity and liminality literatures: (a) further developing an understanding of boundary work as situated, creative and dynamic; (b) unpacking the agentic potential of the ‘black box’ of the hybridity–liminality interplay; and (c) expanding current understandings and applications of the concepts of hybridity and liminality.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12477","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135813857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khalid Durani, Andreas Eckhardt, Walid Durani, Tim Kollmer, Nils Augustin
{"title":"Visual audience gatekeeping on social media platforms: A critical investigation on visual information diffusion before and during the Russo–Ukrainian War","authors":"Khalid Durani, Andreas Eckhardt, Walid Durani, Tim Kollmer, Nils Augustin","doi":"10.1111/isj.12483","DOIUrl":"10.1111/isj.12483","url":null,"abstract":"<p>Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas. However, the advent of social media platforms has disrupted these power dynamics, empowering audiences through user-driven visual information exchanges. This has led to visual audience gatekeeping whereby users act as audience gatekeepers by selectively disseminating visual content, thus shaping information diffusion. While this democratisation of gatekeeping holds considerable promise for user empowerment, it also presents risks. These risks stem from the inherently persuasive yet manipulative qualities of visual content, compounded by users' susceptibility to unconscious biases, especially during polarising events. Therefore, we critically investigated visual audience gatekeeping in the context of the Russo–Ukrainian War, specifically focusing on a Reddit subforum devoted to Russia-related discussions. We find that visual audience gatekeeping operates within a paradigm that reflects the social reality the audience embraces. Audience gatekeepers disseminate visual information both to reproduce and defend an idealised conception of this social reality. Collectively, they produce a visual echo chamber characterised by low information diversity, which, in turn, reinforces and perpetuates the incumbent paradigm. However, heightened social tensions can trigger a paradigm shift and amplify the reproduction and defence processes, increasing the potential for the diffusion of more radical and extreme visual narratives. Based on our findings, we propose a theoretical model of visual audience gatekeeping, which has important implications for research on visuals, gatekeeping and social media platforms.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":null,"pages":null},"PeriodicalIF":6.4,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12483","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}