Dawei (David) Wang, Alexandra Durcikova, A. Dennis
{"title":"Security is Local: The Influence of the Immediate Workgroup on Information Security","authors":"Dawei (David) Wang, Alexandra Durcikova, A. Dennis","doi":"10.17705/1jais.00812","DOIUrl":"https://doi.org/10.17705/1jais.00812","url":null,"abstract":"Information security is a multilevel phenomenon with employee security decisions being influenced by macrolevel factors (e.g., organizational policies), mesolevel factors (e.g., one’s immediate workgroup—IW), and microlevel factors (e.g., individual personalities). We argue that an employee’s local IW (i.e., immediate supervisor and coworkers) has a strong effect on security. This paper focuses on the effects of these mesolevel factors in the presence of macro- and microlevel factors. Drawing on the social structure and social learning framework as well as workgroup research, we hypothesize that the security behavior of an employee’s IW supervisor and coworkers moderated by the nature of these relationships influences information security decisions. Our research, based on a sample of 217 full-time employees, reveals that the IW significantly affects security decisions, over and above the micro- and macrolevel factors. These effects are moderated by the nature of the relationship between employees and their IW supervisor (leader-member exchange) and coworkers (team-member exchange). A post hoc analysis shows that the mesolevel factors alone had the same explanatory power as the micro- and macrolevels combined. Our research suggests that future theory and research should include the IW and that organizations should share security responsibilities with line managers and help them understand their substantial impact on information security. Security training programs should ask employees about the behaviors of their IW supervisor and coworkers and, where needed, deliver anti-neutralization training to mitigate the effects of the IW’s noncompliance behaviors.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"60 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84930965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Do Paternalistic Leaders Motivate Employees' Information Security Compliance? Building a Climate and Applying Sanctions","authors":"Jiawen Zhu, G. Feng, Huigang Liang, K. Tsui","doi":"10.17705/1jais.00794","DOIUrl":"https://doi.org/10.17705/1jais.00794","url":null,"abstract":"This paper examines the underlying mechanisms through which paternalistic leadership (PL) motivates employees’ information systems policy (ISP) compliance. We propose that the three dimensions of PL—authoritarian leadership (AL), benevolent leadership (BL), and moral leadership (ML)—influence employees’ ISP compliance by affecting their perceptions of two information security control mechanisms: sanctions and the information security climate. Based on survey data from 760 participants, we found that the impact of AL is partially mediated by employees’ perceptions of sanctions, the impact of BL is partially mediated by employees’ perceptions of the information security climate, and the impact of ML is partially mediated by employees’ perceptions of both sanctions and the information security climate. Our research extends the existing literature by exploring the impact of specific leadership styles on employees’ perceptions of information security control mechanisms and by proposing that perceptions of information security control mechanisms play a mediating role between PL and ISP compliance. The findings suggest that in addition to choosing effective control mechanisms, it is also important for leaders to adjust their leadership style to ensure that employees perceive control mechanisms in the expected manner.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"33 1","pages":"5"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88534447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things and Competitive Advantage: A Dynamic Capabilities Perspective","authors":"Yulia W. Sullivan, S. Wamba, M. Dunaway","doi":"10.17705/1jais.00807","DOIUrl":"https://doi.org/10.17705/1jais.00807","url":null,"abstract":"Internet of Things (IoT) is one of the enabling technologies of Industry 4.0. Although IoT has shown great promise for organizations, its practical use in generating value alone or in combination with existing IT capabilities remains unclear. Drawing upon the literature on dynamic capabilities and innovation capability, we propose IoT-enabled innovation capability (IoT-IC), consisting of three dimensions (IoT use for sensing, seizing, and reconfiguring) to explain competitive advantage. We examine three ordinary IT capabilities (flexible IT infrastructure, IT business experience, and relationship infrastructure) as the predictors of IoT-IC. We also test the moderating effect of competitive aggressiveness in influencing the relationship between IoT-IC and competitive advantage. Analysis of survey data from 175 U.S. companies provides empirical support for our research model. The results suggest that flexible IT infrastructure, IT business experience, and relationship infrastructure are positively associated with IoT-IC. Furthermore, the effect of IoT-IC on competitive advantage is positively moderated by competitive aggressiveness. The results point to the important role of existing IT capabilities in shaping IoT-IC and expand our understanding of the relationship between IoT-IC and competitive advantage at different levels of competitive aggressiveness.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"23 1","pages":"6"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84409289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"My Precious!\": A Values-Affordances Perspective on the Adoption of Bitcoin","authors":"Constantin Lichti, A. Tumasjan","doi":"10.17705/1jais.00790","DOIUrl":"https://doi.org/10.17705/1jais.00790","url":null,"abstract":"Given the growing pervasiveness of information systems (IS) in everyday life, recent research has acknowledged that IS technologies are often not value free but are instead infused with fundamental personal values. However, little is known about how such values explain why people assimilate these technologies and their affordances. In the intriguing case of Bitcoin, personal values—especially libertarian political values—played an essential role in clarifying the ideological underpinnings of Bitcoin and its early adoption. Consequently, we draw on research on personal values and affordance theory to develop and test a model explicating how these personal values guide individuals toward using IS applications with salient affordances that address their values. Specifically, we hypothesize and test how individuals’ personal values (i.e., libertarian political values) influence their attitudes toward Bitcoin affordances and their Bitcoin use behavior using data from a multiple administration survey of 236 users and nonusers of Bitcoin. Our results indicate that libertarian political values affect individuals’ attitudes toward Bitcoin affordances, which in turn mediate the effects of these values on actual Bitcoin use. Our findings advance the field by demonstrating the importance of integrating values into the conceptualization of IS technology affordances.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"11 1","pages":"9"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73816839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensing the Future: A Design Framework for Context-Aware Predictive Systems","authors":"M. Avital, S. Chatterjee, Szymon J. Furtak","doi":"10.17705/1jais.00821","DOIUrl":"https://doi.org/10.17705/1jais.00821","url":null,"abstract":"Sensors embedded in smart objects, smart machines, and smart buildings produce ever-growing streams of contextual data that convey information of interest about their operating environment. Although an increasing number of industries have embraced the utilization of sensors in routine operations, no clear framework is available to guide designers who aim to leverage contextual data collected from these sensors to develop predictive systems. In this paper, we applied design science research methodology to develop and evaluate a general framework that can help designers build predictive systems utilizing sensor data. Specifically, we developed a framework for designing context-aware predictive systems (CAPS). We then evaluated the framework through its application in MAN Diesel & Turbo, which served as a case company. The framework can be generalized into a class of demand-forecasting problems that rely on sensor-generated contextual data. The CAPS framework is unique and can help practitioners make better-informed decisions when designing context-aware predictive systems.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"105 1","pages":"5"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78776682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Resilience: A Conceptual Framework for Information Systems Research","authors":"Yenni Tim, D. Leidner","doi":"10.17705/1jais.00842","DOIUrl":"https://doi.org/10.17705/1jais.00842","url":null,"abstract":"In this editorial, we explore the role of IS in shaping the capacity to recover from exogenous shocks. Based on a synthesis of existing literature, we discuss the interplay between IS and resilience, as examined by various streams of research, and consolidate these insights under the banner of “digital resilience.” Our exploration culminates in a new conceptual framework of digital resilience from which we formulate avenues for future research. Through this work, we aim to encourage and support further research and practical strategies focused on digital resilience, ultimately strengthening our collective capacity to navigate the diverse disruptions of our shared future.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"46 1","pages":"11"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91012860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Process for Managing Digital Transformation: An Organizational Inertia Perspective","authors":"Evgeny A. Kaganer, R. Gregory, Suprateek Sarker","doi":"10.17705/1jais.00819","DOIUrl":"https://doi.org/10.17705/1jais.00819","url":null,"abstract":"Digital transformation is often described as organizational change that is simultaneously triggered and enabled by digital technologies. As with other types of organizational transformation, overcoming organizational inertia lies at the heart of digital transformation. However, our understanding of the specific processes employed by incumbent firms to overcome organizational inertia in digital transformation is currently limited. In this paper, we draw on the case study of AsiaBank, a large traditional bank in Asia, to explore the microfoundations of how incumbent firms tackle different types of inertia as they embark on a digital transformation journey. We identify four key digital transformation processes—i.e., embracing the consumerization of digital technologies, diffusing and appropriating digital business practices, enabling distributed organizing, and revamping IT architecture—that combine to reduce negative psychology, sociocognitive, sociotechnical, political, and economic inertia in digital transformation. Our findings expand the extant view on the role of agency in overcoming organizational inertia and contribute to the literature at the intersection of digital innovation and transformation.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"50 1","pages":"6"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88896611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shaping Digital Transformation Pathways: Dynamics of Paradoxical Tensions and Responses","authors":"Christina Soh, Adrian Yeow, Qi Wei Goh","doi":"10.17705/1jais.00852","DOIUrl":"https://doi.org/10.17705/1jais.00852","url":null,"abstract":"Although the pace of digital transformation (DT) has been accelerating in more organizations, there is still much uncertainty about the ways organizations can achieve the intended outcomes from such efforts. Rather than just focusing on the transformation outcomes, our paper suggests that a more fruitful approach would be to conceptualize DT as a journey that often encounters contradictory tensions. We adopt paradox theory to explain the dynamics through which organizations can manage these tensions while driving their DT efforts. Drawing on extensive review of the DT literature and preexisting research cases of three organizations’ experiences with the DT process, we developed the concept of DT pathways. DT pathways are the varied journeys experienced by organizations as they make strategic shifts - leveraging digital technology and evolving the organization’s business model. We show how DT pathways emerge as organizations adopt different DT strategic intent, actions, and responses to a range of paradoxical tensions. We outline three potential pathways—virtuous, moderate virtuous, and vicious DT pathways—and their attending predictive propositions, which can serve as a guide for managers and researchers involved in DT efforts and research.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135504737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Digital Transformation Conundrum: Labels, Definitions, Phenomena, and Theories","authors":"M. Markus, F. Rowe","doi":"10.17705/1jais.00809","DOIUrl":"https://doi.org/10.17705/1jais.00809","url":null,"abstract":"The forthcoming JAIS special issue on “Envisioning Digital Transformation” is predicated on the assumption that theoretical diversity would be a good thing for the IS field. But making sense of theoretical diversity requires either a common frame of reference or crystal clarity about concept definitions and the phenomena to which they point. In this editorial, we argue that the IS field still lacks the conceptual and empirical clarity needed to benefit from theoretical diversity about digital transformation. The digital transformation label has been applied to the evolution of technology, as well as to the evolution of organizations and society. It has been used to refer to change in entities or processes and to processes of change. It has been used to refer to particular technological artifacts and to particular kinds of data and processing power. This type of diversity risks obscuring the value of diverse theoretical formulations. Only through clear distinctions and precise labeling of older and new phenomena can the IS field fully benefit from new theories and theoretical elaborations about digital transformation.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"8 1","pages":"10"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75690281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy and Imprecise Concepts: The Case of Digital Transformation","authors":"Shirley Chen, John King","doi":"10.17705/1jais.00742","DOIUrl":"https://doi.org/10.17705/1jais.00742","url":null,"abstract":"","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"169 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75188591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}