Miguel I. Aguirre-Urreta, Mikko Rönkkö, George M. Marakas
{"title":"Reconsidering the implications of formative versus reflective measurement model misspecification","authors":"Miguel I. Aguirre-Urreta, Mikko Rönkkö, George M. Marakas","doi":"10.1111/isj.12487","DOIUrl":"https://doi.org/10.1111/isj.12487","url":null,"abstract":"<p>The literature on formative modelling (“formative measurement”) in the information systems discipline claims that measurement model misspecification, where a reflective model is used instead of a more appropriate formative model, is widespread. In this research, we argue that this cannot be true because models misspecified in this way would fail the measurement validation procedures used with reflective models and thus would not be publishable. To support this argument, we present two extensive simulation studies. The simulation results show that in most cases where data originates from a formative model, estimating a reflective model would not produce results that satisfy the commonly used measurement validation guidelines. Based on these results, we conclude that widespread publication of models where the direction of measurement is misspecified is unlikely in IS and other disciplines that use similar measurement validation guidelines. Moreover, building on recent discussions on modelling endogenous formatively specified latent variables, we demonstrate that the effects of misspecification are minor in models that do pass the model quality check. Our results address important issues in the literature on the consequences of measurement model misspecification and provide a starting point for new advances in this area.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"533-584"},"PeriodicalIF":6.4,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139704637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethics II: Editorial conduct","authors":"Andreas Eckhardt, Christoph F. Breidbach","doi":"10.1111/isj.12499","DOIUrl":"10.1111/isj.12499","url":null,"abstract":"<p>Research misconduct remains a controversial topic and the numbers are staggering. Retractionwatch.com\u0000 1 reported that, in 2002, 119 papers were retracted by scientific journals. Some 20 years later, this figure has grown to almost 5000. Put differently, about 8 in 10 000 published papers are retracted from the scientific literature today. The case of Francesca Gino at Harvard University is yet another example. At the time of writing this Editorial, she stands accused of fabricating results across multiple studies, including at least one purporting to show how to elicit honest behaviour (Scheiber, <span>2023</span>). Of course, all this comes at a time when the Information Systems discipline discusses the implications of generative AI in the research process (Davison et al., <span>2023</span>).</p><p>Against this backdrop, we note that our discipline has a solid track-record of addressing ethical <i>research</i> conduct, with Davison and Chatterjee (<span>2024</span>) describing some concerns we should be aware of in a recent Editorial for the <i>Information Systems Journal</i>. In contrast, the debate pertaining to potential misconduct by editors or reviewers is significantly less developed, with just a few examples aimed at mitigating the shortcomings of the peer review process more generally (including, for example, Iivari, <span>2016</span>, Petter, <span>2018</span>, Ralph, <span>2016</span>).</p><p>We here acknowledge that the journey towards publication of any manuscript in any journal does not only involve authors who may act unethically, but also editors and reviewers. While the responsibility for fraudulent studies undoubtedly rests with dishonest authors, editors and reviewers alike share the responsibility for allowing such studies to pass through the peer-review process, for a long time seen as the ‘gold standard’ in preventing such instances from taking place. We therefore firmly believe that the ethical aspects of editorial (mis)conduct should be equally discussed, a task we set out in this Editorial, the second in a series focusing on ethics in IS research in the <i>Information Systems Journal</i>.</p><p>In what follows, we outline key areas where we, in our role as authors, reviewers, and editors, have personally observed behaviour and actions of <i>others</i> we deem questionable. We further augmented our own experiences with anecdotal evidence gathered through conversations with colleagues from within the IS discipline who are distributed around the world. The common denominator across all situations that we outline here is that they took place within the realms of a double-blind peer-review process, meaning reviewers are unaware of the authors' identities, and vice versa, yet that is single-blind for senior editors (SEs) and associate editors (AEs) (editors know the authors' identities, but authors do not know the editors' identities). Nevertheless, it is fair to point out that at some journals, SEs are permitted","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"965-969"},"PeriodicalIF":6.4,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12499","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138952872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A typology of disinformation intentionality and impact","authors":"Aaron French, Veda C. Storey, Linda Wallace","doi":"10.1111/isj.12495","DOIUrl":"10.1111/isj.12495","url":null,"abstract":"<p>In contemporary society, the increased reliance on social media as a vital news source has facilitated the spread of disinformation that has potential polarising effects. Disinformation, false information deliberately crafted to deceive recipients, has escalated to the extent that it is now acknowledged as a significant cybersecurity concern. To proactively tackle this issue, and minimise the risk of negative outcomes associated with disinformation, this research presents a typology of disinformation intentionality and impact (DII) to understand the intentionality and impact of disinformation threats. The typology draws upon information manipulation theory and risk management principles to evaluate the potential impact of disinformation campaigns with respect to their virality and polarising impact. The intentionality of disinformation spread is related to its believability among susceptible consumers, who are likely to propagate the disinformation to others if they assess it to be believable. Based on the dimensions of intentionality and impact, the DII typology can be used to categorise disinformation threats and identify strategies to mitigate its risk. To illustrate its utility for evaluating the risk posted by disinformation campaigns, the DII typology is applied to a case study. We propose risk mitigation strategies as well as recommendations for addressing disinformation campaigns spread through social media platforms.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1324-1354"},"PeriodicalIF":6.4,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138958606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A configurational perspective on design elements and user governance engagement in blockchain platforms","authors":"Rongen “Sophia” Zhang, Balasubramaniam Ramesh","doi":"10.1111/isj.12494","DOIUrl":"10.1111/isj.12494","url":null,"abstract":"<p>Blockchain technology offers the potential to create an open, decentralised governance structure that empowers stakeholders to participate in decentralised engagement. However, how blockchain platforms configure their design elements to establish and maintain decentralised systems with high levels of user governance engagement requires further research. This study investigates the key design elements of blockchain platforms and their ideal configurations for promoting user governance engagement. Due to the complex and interdependent nature of the design elements, we adopt a configurational perspective accompanied by a fuzzy set qualitative comparative analysis (fsQCA) to uncover complex nonlinear relationships among key conditions that are relevant to decentralised governance. Our research identifies five key design elements that facilitate distributed governance (<i>Access to decision rights</i>, <i>Process visibility</i>, <i>Protocol automation</i>, <i>Incentives for developers/miners</i>, and <i>Incentives for other stakeholders</i>) based on existing blockchain governance literature. We analyse 14 unique blockchain platform cases that adopted on-chain governance. Our fsQCA results reveal three ideal types of blockchain governance configurations that are sufficient for high generative user governance engagement: <i>Centralised incentive model</i>, <i>Impartial incentive model</i>, and <i>Automation-driven model</i>, whereas achieving high evaluative governance engagement requires the presence of all the design elements (<i>Comprehensive model</i>). Also, we found <i>Access to decision rights</i> and <i>Protocol automation</i> are necessary conditions for generative governance engagement, and <i>Access to decision right</i>s together with <i>Process visibility</i> is a combined necessary condition for evaluative governance engagement. Relevant theoretical and practical implications for platform designers as well as methodological implications for applying QCA to emerging IS phenomena are discussed.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1264-1323"},"PeriodicalIF":6.4,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12494","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luca Gastaldi, Francesco Paolo Appio, Daniel Trabucchi, Tommaso Buganza, Mariano Corso
{"title":"From mutualism to commensalism: Assessing the evolving relationship between complementors and digital platforms","authors":"Luca Gastaldi, Francesco Paolo Appio, Daniel Trabucchi, Tommaso Buganza, Mariano Corso","doi":"10.1111/isj.12491","DOIUrl":"10.1111/isj.12491","url":null,"abstract":"<p>Digital platforms are increasingly dominating markets by bringing together two or more groups of users and facilitating the exchange of value between them. Although several significant issues concerning the dynamics of digital platforms have been addressed, much of the research effort has focused on the platform owner. On the other hand, research on complementors neither takes into account the individual level nor clearly shows what an individual complementor can do to benefit from platform participation. By studying the evolving relationship between YouTube and its ecosystem of complementors (content creators), we shed light on the strategies that complementors use to progressively avoid but still benefit from platform governance. We find that content creators are, first, in a mutual relationship with the YouTube platform, benefiting from direct monetization. Then, they shift to commensalism as the relationship evolves, allowing them to avoid YouTube's governance and take advantage of multi-homing. Our findings illuminate the effects of platform governance, particularly how it shapes the actions of complementors.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1217-1263"},"PeriodicalIF":6.4,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138593869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robert M. Davison, Rens Scheepers, Stefan Henningsson, Stan Karanasios
{"title":"The virtue of brevity","authors":"Robert M. Davison, Rens Scheepers, Stefan Henningsson, Stan Karanasios","doi":"10.1111/isj.12492","DOIUrl":"10.1111/isj.12492","url":null,"abstract":"<p>Before the rise of online-only publishing, journals, including the ISJ, operated with page budgets, which determined the annual limit of pages that could be published. A decade ago, at the ISJ, this amounted to some 576 journal pages. However, with the advent of online-only publishing, the concept of a page budget has disappeared. The total number of pages increased gradually, at first to 666, to 800 and then it jumped to over 1000. Wiley, the publisher of the ISJ, has informed us that there is no limit at all to how many pages (or articles) we can publish a year, so long as quality standards are maintained. In 2023, the ISJ published 43 research articles, 8 editorials and 3 book reviews, a total of 1458 journal pages or 253% of the pre-online-only model. We expect that in future these numbers will continue to rise.</p><p>Not only has the number of accepted articles increased but also has their length. It used to be the case that we requested authors to keep within 8000 words. This was supposed to be an all-inclusive word count from title to references and appendices. With the passing of time, the restrictions of paper length have largely disappeared. Table 1 below presents the guidance given to authors for the AIS Senior Scholars' List of Premier Journals as well as several others. While there is some wiggle room, the general guidance tends to sit within the 8000- to 12 000-word range, or 38–55 pages. This is similar to adjacent fields: the <i>Academy of Management Journal</i> allows 40 double-spaced pages including references, tables, figures and appendices,1 and Organisation Studies permits up to 13 000 words encompassing references, tables, figures and appendices.2 Computer Science journals tend to publish briefer papers. For instance, IEEE Transactions on Pattern Analysis and Machine Intelligence allows 35 double spaced pages3 and IEEE Communications Surveys & Tutorials charges authors $220 for per page over 30 pages (up to 8 pages).4</p><p>Today it is not unusual for a first-round submission to be in the 12 000-word range and for a finally accepted article to be 15 000. Even 20 000-word epics are by no means unheard of. Why all this verbosity? One reason is that authors and reviewers get trapped in what we call a text-accumulation trap. Authors submit papers with as much information as possible, hoping to instil confidence in the review team as to its completeness, as well as to prepare for both expected and unexpected reviewer demands. Reviewers then read the paper, yet ask for even more detail, and authors feel obliged to respond in kind. Over multiple revision cycles, satisfying all the reviewers requires ever more words. Reviewers should be mindful of the text-accumulation trap. When requesting authors to incorporate large amounts of new material, it is necessary to weigh the value of this extra material against the risk of unnecessarily bloating the manuscript.</p><p>In addition, it is easier to write more than less, easier to i","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"287-292"},"PeriodicalIF":6.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12492","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139207329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From web forms to chatbots: The roles of consistency and reciprocity for user information disclosure","authors":"Martin Adam, Alexander Benlian","doi":"10.1111/isj.12490","DOIUrl":"10.1111/isj.12490","url":null,"abstract":"<p>Interactive decision aids (IDAs) on websites often require users to disclose relevant information (e.g., preferences, contact information) to help users in making decisions (e.g., product choice). With technological advances in IDAs, websites increasingly switch from static, non-conversational IDAs (e.g., web forms) to conversational ones (e.g., chatbots) to boost user information disclosure that nurtures the websites' economic viability. While this novel form of IDAs is already widely employed in practice, information systems research has yet to examine the defining dialogue design features of conversational IDAs and their effects on eliciting user information. Drawing on persuasion theory and particularly on consistency and reciprocity as influence techniques, we develop a research model around two crucial dialogue design features of conversational IDAs. Specifically, we investigate the distinct and joint effects of conversational style (i.e., absence vs. presence of a conversational presentation of requests) and reciprocation triggers (i.e., absence vs. presence of reciprocity-inducing information) on user information disclosure (i.e., email addresses). By combining the complementary properties of a randomised field experiment (<i>N</i> = 386) and a follow-up online experiment (<i>N</i> = 182), we empirically provide evidence in support of the distinct and joint effects of conversational style and reciprocation triggers of IDAs on user information disclosure. Moreover, we demonstrate that these dialogue design features have indirect effects on information disclosure via perceptions of social presence and privacy concerns. Thus, our paper provides theoretical and practical insights into whether, how, and why critical IDA dialogue design features can better elicit user information for website services.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1175-1216"},"PeriodicalIF":6.4,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12490","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139226418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feng Xu, Carol Hsu, Tawei (David) Wang, Paul Benjamin Lowry
{"title":"The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation","authors":"Feng Xu, Carol Hsu, Tawei (David) Wang, Paul Benjamin Lowry","doi":"10.1111/isj.12488","DOIUrl":"10.1111/isj.12488","url":null,"abstract":"<p>Organisational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever-increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organisational security problems. This study therefore focuses on employees' proactive <i>information security behaviours</i> (ISBs)—behaviours that are self-initiated, change-oriented, and future-focused—and the motivations that compel employees to protect organisational assets. We ground our study in Parker et al. (2010) proactive motivation theory (ProMT) and develop an integrated multilevel model to examine the respective effects of proactive motivational states, that is, <i>can-do</i>, <i>reason-to</i>, and <i>energised-to</i> motivations, on employees' proactive ISBs. We also explore the roles of individual differences and contextual factors—namely, proactive personality and supervisory ISec support—and their influences on proactive motivational states. Data were collected from 210 employees situated in 55 departments distributed among multiple organisations located in China. The results show that supervisory ISec support positively influences employees' proactive motivational states and thereby boosts employees' proactive ISBs. Proactive personality negatively moderates the effect of supervisory ISec support on flexible security role orientation (reason-to motivation). By identifying the antecedents of employees' proactive ISBs, we make key theoretical contributions to ISec research and valuable practical contributions to organisational ISec management.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1144-1174"},"PeriodicalIF":6.4,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12488","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139249660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical investigation of social comparison and open source community health","authors":"Kevin Lumbard, Matt Germonprez, Sean Goggins","doi":"10.1111/isj.12485","DOIUrl":"10.1111/isj.12485","url":null,"abstract":"<p>It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"499-532"},"PeriodicalIF":6.4,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accountability mobilization, guanxi and social media-induced polarization: Understanding the bystander's prosocial punishment to misinformation spreader","authors":"Zhe Zhu, Nan Zhang, Meiwen Ding, Lei Chen","doi":"10.1111/isj.12486","DOIUrl":"10.1111/isj.12486","url":null,"abstract":"<p>Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1116-1143"},"PeriodicalIF":6.4,"publicationDate":"2023-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}