Information Systems Journal最新文献

筛选
英文 中文
Preparing ecosystems for platformization: Insights from multiple case studies 为平台化准备生态系统:来自多个案例研究的见解
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-08-21 DOI: 10.1111/isj.12467
Yueqiu Hu, Shuning Zheng, Alain Yee Loong Chong, Eric T. K. Lim, Chee-Wee Tan
{"title":"Preparing ecosystems for platformization: Insights from multiple case studies","authors":"Yueqiu Hu,&nbsp;Shuning Zheng,&nbsp;Alain Yee Loong Chong,&nbsp;Eric T. K. Lim,&nbsp;Chee-Wee Tan","doi":"10.1111/isj.12467","DOIUrl":"10.1111/isj.12467","url":null,"abstract":"<p>Platformization is gathering pace because it is capable of restructuring the value creation process for ecosystems. Despite its merits, the failure rate of platformization is alarming for incumbents because it demands collective commitment from ecosystem partners who are already intricately connected due to their embeddedness in pre-existing value networks. Consequently, the question of how incumbents can prepare for platformization has attracted attention from both academics and practitioners alike. By conducting multiple case studies of three distinct ecosystems that have successfully embraced platformization, we arrive at three separate process patterns of preparation for ecosystem platformization that elucidate the dimensions of organisational readiness required of the initiating firm and its partners. Particularly, we delineate between shared readiness and situated readiness, each with its own constituent sub-dimensions underlying ecosystems' preparedness for platformization.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1004-1036"},"PeriodicalIF":6.4,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42229000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Institutional factors related to digital entrepreneurship by startups and SMEs in the Latin American context: Two cases in Brazil 拉丁美洲背景下与初创企业和中小企业数字创业相关的制度因素:巴西的两个案例
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-08-21 DOI: 10.1111/isj.12466
Amarolinda Zanela Klein, Gabriel Machado Braido
{"title":"Institutional factors related to digital entrepreneurship by startups and SMEs in the Latin American context: Two cases in Brazil","authors":"Amarolinda Zanela Klein,&nbsp;Gabriel Machado Braido","doi":"10.1111/isj.12466","DOIUrl":"10.1111/isj.12466","url":null,"abstract":"<p>Digital entrepreneurship relies not only on the individual entrepreneurs' skills and effort but also on rules and structures related to institutions, especially in developing contexts such as Latin America. Considering this, we analyse how institutional factors can affect digital entrepreneurship by SMEs and startups and what types of institutional changes are needed to support digital entrepreneurship by these companies. Based on institutional theory as a theoretical lens, we conducted two case studies in Brazil. The research results indicate that the digital entrepreneurial ecosystem's actors perform institutional work that generates changes related to the regulative, normative, and cultural/cognitive institutional pillars. These changes affect both the legitimacy of digital innovations created by SMEs and startups and the legitimacy of these companies as ecosystem players, which is vital for them to access the resources needed to innovate and thrive. Based on these results, we propose a theoretical framework and provide suggestions for practice and public policies related to digital entrepreneurship by SMEs and startups in the context studied.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"970-1003"},"PeriodicalIF":6.4,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44710352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trending topics workshop 热门话题研讨会
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-08-08 DOI: 10.1111/isj.12465
Andreas Eckhardt
{"title":"Trending topics workshop","authors":"Andreas Eckhardt","doi":"10.1111/isj.12465","DOIUrl":"10.1111/isj.12465","url":null,"abstract":"&lt;p&gt;Reforming and innovating how the &lt;i&gt;Information Systems Journal&lt;/i&gt; (ISJ) publishes and promotes research has always been a core value of the journal. Therefore, in 2021, we introduced a new submission format with the ISJ Trending Topics Workshop. After 2 years, we are pleased to announce that the first paper from the ISJ Trending Topics Workshop series will be published in the journal. Adam et al. (2023) was submitted to the first workshop issue in June 2021 and will appear in this issue.&lt;/p&gt;&lt;p&gt;The ISJ Trending Topics Workshop is an annual paper development workshop (PDW) format held in early to mid-June prior to the European Conference on Information Systems (ECIS). We use a hybrid format for the workshop, allowing authors to participate virtually, ensuring inclusivity, and overcoming geographical barriers for those participants who are unable to travel to ECIS. Due to the COVID-19 pandemic and related travel restrictions, the workshop was held in a virtual format in 2021 and 2022. This year, we were able to organise the workshop in a hybrid format on 13 June 2023, in Kristiansand with 28 on-site and 20 virtual participants.&lt;/p&gt;&lt;p&gt;The PDW encourages scholarship that focuses on high-impact research on emerging trending topics in the IS field, such as inclusive digital initiatives, IS in social and political protests, the impact of generative AI, the ethical use of data, algorithms, and design, social cyberwarfare and cybersecurity, applications of blockchain technology, the role of IS in climate change, and many more. Prior to the workshop, participants whose papers have been accepted for discussion in the workshop receive two additional papers to read and review for their roundtable. During the workshop, participants meet in small groups or virtual breakout rooms where they receive feedback from ISJ Editorial Board members and provide feedback on other participants' papers. The ISJ SEs and AEs facilitate the discussion so that each participant has equal time to receive comments from others in the roundtable.&lt;/p&gt;&lt;p&gt;Selection for the ISJ Trending Topics Workshop is competitive. This workshop focuses on trending topics and significant societal issues, packaged in a high-quality, high-impact research paper. To be considered for the workshop, a paper must demonstrate a significant contribution to IS research, with or without data. The following table shows the number of submissions to and the acceptance rate for the workshop.\u0000 &lt;/p&gt;&lt;p&gt;Authors of workshop papers are not obligated to submit their work to the ISJ after the workshop, but it is ISJ's goal that those papers that receive feedback during the workshop will be ready for submission and further consideration for publication in ISJ after the workshop. Although the paper from the 1st edition of the ISJ's Trending Topics Workshop is published in this issue, papers from the 2nd and 3rd editions of the workshop are currently under review and will be published in future issues of the ISJ","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1423-1425"},"PeriodicalIF":6.4,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12465","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42877589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quirks, neologisms, provocations and the mundane: Titles and interpretations 测验、新词、挑衅和世俗:标题和解释
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-08-06 DOI: 10.1111/isj.12464
Robert M. Davison
{"title":"Quirks, neologisms, provocations and the mundane: Titles and interpretations","authors":"Robert M. Davison","doi":"10.1111/isj.12464","DOIUrl":"10.1111/isj.12464","url":null,"abstract":"&lt;p&gt;As editor, I get to read a lot of titles, the vast majority of which, alas, we do not end up publishing. In this editorial, I would like to reflect briefly on the nature of titles and their effectiveness in conveying a quick message to a potential reader.&lt;/p&gt;&lt;p&gt;Throughout the course of my career, I cannot ever recall seeing any advice about how to create a title for a research paper. Titles in general are meaningful and give some clues as to the content of the article that follows. Sometimes we see a title that really catches the eye, that inspires, or even that disgusts, depending on our individual taste. Here is an example of a title of a paper that, regrettably, we did not publish: ‘Rat Swarm Pelican Based Deep Learning And Sequence Mining For Web Page Recommendation’. How do you feel about that? The first three words alone may suffice to turn you on or off. Why the authors thought that the article might be suitable for the ISJ is another matter, but the title alone has a certain unique quality that might seduce or repel you. Thus, just as the creation of a title is a subjective process, so too is the interpretation of a title. But there are some aspects of a title that are worth examining a little more carefully. For instance, we can look at length, depth, comprehensibility, suitability and so forth. In the paragraphs below, I offer some recent ISJ titles and my own analysis. My purpose is to alert readers to the potential for value in a title, and to gently suggest that the creation of a title is itself an art that is worth examining and practicing carefully.&lt;/p&gt;&lt;p&gt;At one extreme, I have seen titles that are almost as long as the abstract. These often tend to mundane description rather than creative quirkiness. The longer titles often have two parts, separated by a dash or colon. It seems that the authors want to cram into the title as many parts of the study as possible, including in some cases a list of all the moderating and mediating variables. This is probably effective both in conveying the substance of a paper to potential readers, and in lengthening one's cv by a line or two. But is it really necessary? Could one devise a more frugal title that is nevertheless attractive to potential readers? The longest I can see at the ISJ in recent years is Kranz et al. (&lt;span&gt;2016&lt;/span&gt;) ‘Understanding the influence of absorptive capacity and ambidexterity on the process of business model change: The case of on-premise and cloud computing software’. It is quite comprehensive and certainly provides very clear information to the reader on what to expect in the article. In contrast, the shortest title at the ISJ (excluding editorials) is Clarke's (&lt;span&gt;2016&lt;/span&gt;) ‘Big Data, Big Risks’. Not only is this short and pithy, but it is also quite provocative and controversial. It may be disliked by those who are enamoured of big data for instance. It seems to embed the personal stance of the researcher. As a title, I think it is quite attractive and","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1275-1278"},"PeriodicalIF":6.4,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12464","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42087224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘What a waste of time’: An examination of cybersecurity legitimacy “真是浪费时间”:对网络安全合法性的审查
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-07-19 DOI: 10.1111/isj.12460
W. Alec Cram, John D'Arcy
{"title":"‘What a waste of time’: An examination of cybersecurity legitimacy","authors":"W. Alec Cram,&nbsp;John D'Arcy","doi":"10.1111/isj.12460","DOIUrl":"10.1111/isj.12460","url":null,"abstract":"<p>Managers who oversee cybersecurity policies commonly rely on managerial encouragement (e.g., rewards) and employee characteristics (e.g., attitude) to drive compliant behaviour. However, whereas some cybersecurity initiatives are perceived as reasonable by employees, others are viewed as a ‘waste of time’. This research introduces employee judgements of <i>cybersecurity legitimacy</i> as a new angle for understanding employee compliance with cybersecurity policies over time. Drawing on theory from the organisational legitimacy and cybersecurity literature, we conduct a three-wave survey of 529 employees and find that, for each separate wave, negative legitimacy judgements mediate the relationship between management support and compliance, as well as between cybersecurity inconvenience and compliance. Our results provide support for cybersecurity legitimacy as an important influence on employee compliance with cybersecurity initiatives. This is significant because it highlights to managers the importance of not simply expecting compliant employee behaviour to follow from the introduction of cybersecurity initiatives, but that employees need to be convinced that the initiatives are fair and reasonable. Interestingly, we did not find sufficient support for our expectation that the increased likelihood of a cybersecurity incident will moderate the legitimacy-policy compliance relationship. This result suggests that the legitimacy perceptions of employees are unyielding to differences in the risk characteristics of the cybersecurity incidents facing organisations.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1396-1422"},"PeriodicalIF":6.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12460","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47086021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diversity, Equity and Inclusion in the AIS: Challenges and opportunities of remote conferences AIS的多样性、公平性和包容性:远程会议的挑战和机遇
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-07-19 DOI: 10.1111/isj.12458
Marco Marabelli, Sam Zaza, Silvia Masiero, Jingyao (Lydia) Li, Kathy Chudoba
{"title":"Diversity, Equity and Inclusion in the AIS: Challenges and opportunities of remote conferences","authors":"Marco Marabelli,&nbsp;Sam Zaza,&nbsp;Silvia Masiero,&nbsp;Jingyao (Lydia) Li,&nbsp;Kathy Chudoba","doi":"10.1111/isj.12458","DOIUrl":"https://doi.org/10.1111/isj.12458","url":null,"abstract":"<p>With this research opinion article, we aim to contribute to the ongoing conversation concerning diversity, equity and inclusion (DEI) within the IS community. Following Windeler et al.'s (2020) research on perceptions of DEI among members of the Association for Information Systems (AIS), we focus on how conferences should be convened in the post-COVID-19 era to maximise inclusivity. What are the benefits, challenges and implications of holding online and hybrid conferences? Informed by feedback from a survey involving IS scholars in the Global South and from a wide array of AIS senior scholars and conference leaders, we identify several challenges and opportunities of online and hybrid conferences (or, more generally, conferences allowing remote access) for the IS community. We weigh these tradeoffs and implications for DEI and provide reflections to generate constructive discussion on the future of AIS conferences.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1370-1395"},"PeriodicalIF":6.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12458","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50137983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The practitioner perspective 从业者视角
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-07-18 DOI: 10.1111/isj.12461
Robert M. Davison, Marco Marabelli, Yenni Tim, Cynthia Beath
{"title":"The practitioner perspective","authors":"Robert M. Davison,&nbsp;Marco Marabelli,&nbsp;Yenni Tim,&nbsp;Cynthia Beath","doi":"10.1111/isj.12461","DOIUrl":"https://doi.org/10.1111/isj.12461","url":null,"abstract":"&lt;p&gt;The Information Systems (IS) discipline traces its origins to issues that were of interest to practitioners, but in recent years the practitioner perspective has often been neglected. Nevertheless, there is increasing recognition that the practitioner's perspective is still important and that the research we undertake can (or should) have implications for practitioners. Journals like MIS Quarterly Executive target this segment exclusively. In this, they complement non-IS journals and magazines in the broader business and technology spheres that also have practitioners in mind, including: Harvard Business Review, Sloan Management Review, California Management Review, Communications of the ACM, McKinsey Quarterly, Academy of Management Perspectives, CIO Magazine, etc. Moreover, some of the existing journals that are predominantly focused on publishing theoretical contributions, for example, the journals that make up the Association of Information Systems' College of Senior Scholars list of eleven premier journals,1 have also demonstrated that they are open to practitioner-oriented submissions.&lt;/p&gt;&lt;p&gt;The Information Systems Journal (ISJ) has for several years championed the publication of what we call Practitioner Papers (PPs). PPs can contribute to knowledge in a number of different ways, but one of our key objectives in promoting PPs is to further the dialogue between academia and practice. As part of this dialogue, PPs should provide deep insights for researchers into the practitioner's experience with IS in a particular context, as well as, of course, prescriptive and actionable recommendations for practice based on well executed research. Insights for practice may include reframing or reimagining specific practitioner problems, offering a thorough exploration of a phenomenon, documenting lessons learned by practitioners, or illustrating good practices and their outcomes. To render these insights actionable, these articles will include action-oriented prescriptions that suggest what practitioners should do differently in practice.&lt;/p&gt;&lt;p&gt;While practitioners are the primary intended audience of PPs, academic researchers may also benefit, for instance when PPs engage with new phenomena and propose new insights that challenge and extend the existing discourse. Such outcomes can inspire future academic work to re-examine those prior findings, perhaps as part of the researcher's problematisation of the phenomenon (Chatterjee &amp; Davison, &lt;span&gt;2021&lt;/span&gt;).&lt;/p&gt;&lt;p&gt;Although practitioners are commonly thought of as working in or for organisations, we recognise that practitioners can be found in diverse settings and may not necessarily be serving a corporate entity. We can find practitioners in the political spectrum (i.e., lawmakers), non-governmental organisations, charities, villages, and communities. They may be formally employed, working as activists, or simply citizens with an interest in using IS to make the world a better place (Walsham, &lt;spa","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1455-1458"},"PeriodicalIF":6.4,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12461","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gamified monetary reward designs: Offering certain versus chance-based rewards 游戏化货币奖励设计:提供特定奖励与基于机会的奖励
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-07-18 DOI: 10.1111/isj.12459
Martin Adam, Annika Reinelt, Konstantin Roethke
{"title":"Gamified monetary reward designs: Offering certain versus chance-based rewards","authors":"Martin Adam,&nbsp;Annika Reinelt,&nbsp;Konstantin Roethke","doi":"10.1111/isj.12459","DOIUrl":"10.1111/isj.12459","url":null,"abstract":"<p>To motivate visitors to engage with websites, e-tailers widely employ monetary rewards (e.g., vouchers, discounts) in their website designs. With advances in user interface technologies, many e-tailers have started to offer <i>gamified monetary reward designs</i> (MRDs), which require visitors to earn the monetary reward by playing a game, rather than simply claiming the reward. However, little is known about whether and why gamified MRDs engage visitors compared to their non-gamified counterpart. Even less is known about the effectiveness of gamified MRDs when providing <i>certain</i> or <i>chance-based</i> rewards, in that visitors do or do not know what reward they will gain for successfully performing in the game. Drawing on cognitive evaluation theory, we investigate gamified MRDs with certain or chance-based rewards and contrast them to non-gamified MRDs with certain rewards in user registration systems. Our results from a multi-method approach encompassing the complementary features of a randomised field experiment (<i>N</i> = 651) and a randomised online experiment (<i>N</i> = 330) demonstrate differential effects of the three investigated MRDs on user registration. Visitors encountering either type of gamified MRD are more likely to register than those encountering a non-gamified MRD. Moreover, gamified MRDs with chance-based rewards have the highest likelihood of user registrations. We also show that MRDs have distinct indirect effects on user registration via anticipated experiences of competence and sensation. Overall, the paper offers theoretical insights and practical guidance on how and why gamified MRDs are effective for e-tailers.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1426-1454"},"PeriodicalIF":6.4,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12459","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49140873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The digital augmentation of extremism: Reviewing and guiding online extremism research from a sociotechnical perspective 极端主义的数字化增强:从社会技术角度审视和指导网络极端主义研究
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-07-17 DOI: 10.1111/isj.12454
Marten Risius, Kevin M. Blasiak, Susilo Wibisono, Winnifred R. Louis
{"title":"The digital augmentation of extremism: Reviewing and guiding online extremism research from a sociotechnical perspective","authors":"Marten Risius,&nbsp;Kevin M. Blasiak,&nbsp;Susilo Wibisono,&nbsp;Winnifred R. Louis","doi":"10.1111/isj.12454","DOIUrl":"10.1111/isj.12454","url":null,"abstract":"<p>Online extremism remains a persistent problem despite the best efforts of governments, tech companies and civil society. Digital technologies can induce group polarization to promote extremism and cause substantial changes to extremism (e.g., create new forms of extremism, types of threats or radicalization approaches). Current methods to counter extremism induce undesirable side-effects (e.g., ostracize minorities, inadvertently promote extremism) or do not leverage the full potential of digital technologies. Extremism experts recognize the need for researchers from other disciplines, like information systems, to contribute their technical expertise for understanding and countering online extremism. This article aims to introduce the field of information systems to the issue of online extremism. Information systems scholars address technology-related societal issues from a sociotechnical perspective. The sociotechnical perspective describes systems through a series of interactions between social (structure, people) and technical components (physical system, task). We apply the sociotechnical perspective to (1) summarize the current state-of-the-art knowledge of 222 articles in a systematic multi-disciplinary literature review and (2) propose specific research questions that address two questions (How do digital technologies augment extremism? How can we successfully counter online extremism?).</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 3","pages":"931-963"},"PeriodicalIF":6.4,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12454","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41800265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design process knowledge for crisis-driven information systems solutions: Insights on building digital resilience from an action design research study 危机驱动的信息系统解决方案的设计过程知识:行动设计研究对建立数字弹性的见解
IF 6.4 2区 管理学
Information Systems Journal Pub Date : 2023-07-17 DOI: 10.1111/isj.12457
Yenni Tim, Thiam Kian Chiew, Hooi Min Lim, Chin Hai Teo, Chirk Jenn Ng
{"title":"Design process knowledge for crisis-driven information systems solutions: Insights on building digital resilience from an action design research study","authors":"Yenni Tim,&nbsp;Thiam Kian Chiew,&nbsp;Hooi Min Lim,&nbsp;Chin Hai Teo,&nbsp;Chirk Jenn Ng","doi":"10.1111/isj.12457","DOIUrl":"10.1111/isj.12457","url":null,"abstract":"<p>As global disruptions escalate, digital resilience (DR)—the capacity to anticipate, absorb, and adapt to external shocks by leveraging Information Systems (IS)—has become crucial for individuals and organisations confronting and managing unprecedented crises. This research advances understanding on how to develop DR, drawing on insights from an Action Design Research (ADR) study conducted during the COVID-19 pandemic. Our research explores a particular facet of DR: the capacity to manage exogenous shocks through the <i>design</i>  of new IS solutions. We introduce the ADAPT framework, comprising five key enablers—Agility, Designation, Alignment, Participation, and Trust—recommended to support design teams developing IS solutions <i>during</i> and <i>for</i> crises. Our ADR project, which resulted in the creation of a telemonitoring system used by over 115 frontline healthcare workers to monitor the symptoms of more than 1000 COVID-19 patients, demonstrates the instrumental role these five enablers play in supporting a crisis-propelled IS design process that is urgent, resource-limited, and multi-partite. By presenting new design process knowledge and practical recommendations that guide crisis-driven IS design, we aim to equip design teams with the understanding they need to effectively navigate similar challenges in the future. We also hope to inspire and support IS researchers to apply their expertise in the design, deployment, and use of IS solutions to contribute to crisis-driven design endeavours that tackle the pressing and urgent challenges of our time.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1343-1369"},"PeriodicalIF":6.4,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12457","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44846695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信