{"title":"How does response to work communication impact employees’ collaborative performance? A view of the social connectivity paradox","authors":"Pengzhen Yin , Yulin Fang , Wangchun Zhang , Liang Liang","doi":"10.1016/j.im.2024.103983","DOIUrl":"https://doi.org/10.1016/j.im.2024.103983","url":null,"abstract":"<div><p>Contemporary digital work practices increasingly necessitate prompt responses by employees to work-related communication. The impact of employees’ response behavior to work communication (RBWC) on collaborative performance remains underexplored. To address this gap, we propose a theoretical model integrating the theories of person-environment fit, social support, and conservation of resources. RBWC is conceptualized as the degree of communication response (in)congruence, representing the (mis)fit between rapid response expectations and the employee's ability to respond rapidly. We investigate the diverse effects of various states of response congruence on collaborative performance, mediated by the social connectivity paradox manifested as social support and social overload, while grounding this work on social support theory. The results from surveying 268 professionals and employing polynomial regression and surface response analysis demonstrate that different response congruence states significantly influence the social connectivity paradox and subsequently impact collaborative performance. Social support mediates the relationship between response congruence and collaborative performance, while social overload mediates the linear association between response ability and collaborative performance. Theoretical and practical implications are discussed.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103983"},"PeriodicalIF":9.9,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced governance measure for deep synthesis applications: Addressing the moderating effect of moral sensitivity through message framing","authors":"Minghui Li , Yan Wan , Liufang Zhou , Hengyi Rao","doi":"10.1016/j.im.2024.103982","DOIUrl":"10.1016/j.im.2024.103982","url":null,"abstract":"<div><p>The risk of malicious deep synthesis lurks in hedonic applications, yet people tend to be ethically tolerant, leaving governance in a quandary. This study explores the reason for this from the perspective of moral judgment and finds that hedonic applications reduce people's sensitivity to ethical norms. We then explore the mechanism of the governance measure labels, using moral sensitivity as a moderating variable, and find that people with low moral sensitivity are immune. Finally, we propose and validate the inclusion of message framing as an enhancement. This study explains the governance dilemma from a moral-psychological perspective and provides practical governance improvements.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103982"},"PeriodicalIF":9.9,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141033679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demystifying data governance for process mining: Insights from a Delphi study","authors":"Kanika Goel , Niels Martin , Arthur ter Hofstede","doi":"10.1016/j.im.2024.103973","DOIUrl":"10.1016/j.im.2024.103973","url":null,"abstract":"<div><p>Data governance is recognised as a new capability for organisations to maximize the value of data. Process mining is essential for the resilient growth of businesses, making process data a strategic asset for organisations. Even though the availability of reliable process data is vital for obtaining dependable insights into process mining techniques, there exists no framework that explains how to govern process data holistically. We address this gap by presenting the first data governance framework for process mining that was derived from a Delphi study conducted with a panel of academics and practitioners from around the world. The framework provides multiple avenues for future research.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103973"},"PeriodicalIF":9.9,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0378720624000557/pdfft?md5=91cc6c706f5cfbee767513d9c2592c17&pid=1-s2.0-S0378720624000557-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141037867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ka Wai (Stanley) Choi , Wentao Ma , Shuk Ying Ho , Dickson Wu
{"title":"The power of prediction with Google searches and social media posts: Retail investor interest and IPO pricing","authors":"Ka Wai (Stanley) Choi , Wentao Ma , Shuk Ying Ho , Dickson Wu","doi":"10.1016/j.im.2024.103972","DOIUrl":"https://doi.org/10.1016/j.im.2024.103972","url":null,"abstract":"<div><p>This paper investigates the association between retail investors’ online activity and the pricing of initial public offerings (IPOs). We utilize data from Google Trends and StockTwits to analyze price revision for 901 U.S. IPOs, and find that the online search count, social media post count, and post sentiment are positively associated with IPO pricing. One-standard-deviation increases in these variables correspond to price revision increases of 9.02 %, 50.73 %, and 70.22 %, respectively. Additionally, online search plays a more significant role in influencing IPO price revision when social media discussions about a specific IPO exhibit higher sentiment inequality among participants.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103972"},"PeriodicalIF":9.9,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0378720624000545/pdfft?md5=c6627ae1a6b06cc7c0322e2cc8c74ee3&pid=1-s2.0-S0378720624000545-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The diffusion of malicious content on Twitter and its impact on security","authors":"Yaman Roumani","doi":"10.1016/j.im.2024.103971","DOIUrl":"https://doi.org/10.1016/j.im.2024.103971","url":null,"abstract":"<div><p>While Twitter remains one of the most popular social media networks within the information security community, threat actors continue to abuse the platform to create, share, and spread malicious contents. In this study, we focus on whether Twitter- and vulnerability-related features can help predict vulnerabilities known to be actively exploited. Using a sample of 6004 tweets, results show that Twitter features (tweets and quote tweets) that combine the benefits of both content creation and sharing can predict active exploitation of vulnerabilities. Furthermore, findings show that certain technical and vulnerability-related features are also capable of predicting active exploitations.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103971"},"PeriodicalIF":9.9,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethics-based AI auditing: A systematic literature review on conceptualizations of ethical principles and knowledge contributions to stakeholders","authors":"Joakim Laine, Matti Minkkinen, Matti Mäntymäki","doi":"10.1016/j.im.2024.103969","DOIUrl":"https://doi.org/10.1016/j.im.2024.103969","url":null,"abstract":"<div><p>This systematic literature review synthesizes the conceptualizations of ethical principles in AI auditing literature and the knowledge contributions to the stakeholders of AI auditing. We explain how the literature discusses fairness, transparency, non-maleficence, responsibility, privacy, trust, beneficence, and freedom/autonomy. Conceptualizations vary along social/technical- and process/outcome-oriented dimensions. The main stakeholders of ethics-based AI auditing are system developers and deployers, the wider public, researchers, auditors, AI system users, and regulators. AI auditing provides three types of knowledge contributions to stakeholders: 1) guidance; 2) methods, tools, and frameworks; and 3) awareness and empowerment.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103969"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laura Ruiz , Jose Benitez , Ana Castillo , Jessica Braojos
{"title":"Digital human resource strategy: Conceptualization, theoretical development, and an empirical examination of its impact on firm performance","authors":"Laura Ruiz , Jose Benitez , Ana Castillo , Jessica Braojos","doi":"10.1016/j.im.2024.103966","DOIUrl":"https://doi.org/10.1016/j.im.2024.103966","url":null,"abstract":"<div><p>Companies increasingly rely on individuals' skills, enthusiasm, and creativity, all the while striving to fully embrace digitalization as an integral aspect of the business. Technological mediation has altered the design and functionality of work, although the Information Systems (IS) literature about human resource management (HRM) provides little empirical evidence of the synergy between the two fields. To shed light on how these interlinked systems generate performance gains, we draw on the sociotechnical perspective to propose the concept of <em>digital HR strategy</em> as an explicit recognition of the fusion and integration of HR processes and digital technologies. This paper also theorizes and empirically demonstrates that a digital HR strategy improves organizational performance. The model is empirically tested using archival data from a sample of 351 firms.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 4","pages":"Article 103966"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S037872062400048X/pdfft?md5=250c997354d98d8f9baaacb235c9430e&pid=1-s2.0-S037872062400048X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140822207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Felicitas Kuch , Anna-Katharina Lindenthal , Anna Maria Oberländer , Annette Cortenraad-Wenninger , Christoph Buck
{"title":"The SmartSI Compass: A method for generating smart service innovation ideas","authors":"Felicitas Kuch , Anna-Katharina Lindenthal , Anna Maria Oberländer , Annette Cortenraad-Wenninger , Christoph Buck","doi":"10.1016/j.im.2024.103965","DOIUrl":"https://doi.org/10.1016/j.im.2024.103965","url":null,"abstract":"<div><p>Smart Service Innovations (SmartSIs) are crucial for future competitiveness, but established organizations often struggle with the complexity of generating SmartSI ideas. Thus, we propose the <em>SmartSI Compass,</em> a method for systematically generating SmartSI ideas drawing from current smart service research and being theoretically anchored in technological, value creation, and systems perspectives. We developed the method in collaboration with practitioners according to design science research. With the <em>SmartSI Compass</em>, we make a prescriptive contribution to the body of knowledge on the initiation phase of digital innovation and support practitioners in generating SmartSI ideas.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103965"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0378720624000478/pdfft?md5=eed84ca6fbb7d8b94d0b7219a228aaa0&pid=1-s2.0-S0378720624000478-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to strategically respond to online hotel reviews: A strategy-aware deep learning approach","authors":"Chih-Hao Ku , Yung-Chun Chang , Yichuan Wang","doi":"10.1016/j.im.2024.103970","DOIUrl":"10.1016/j.im.2024.103970","url":null,"abstract":"<div><p>Online reviews exert a considerable influence on consumer purchase behavior, yet there remains ambiguity about the most effective managerial response strategies for positive and negative reviews. Addressing this gap, our study introduces a Strategy-Aware, Deep Learning-Based Natural Language Processing (Sa-DLNLP) model designed to optimize firm responses. The proposed model underwent rigorous evaluation through a human-coded study and was subsequently validated by a separate user response study. Our findings reveal that active-constructive responses significantly enhance the impact of positive reviews, whereas passive-constructive strategies are more effective in mitigating the damage from negative reviews. Additionally, the study underscores the importance of concise, personalized, and prompt responses across the board. Interestingly, responses that are overly explanatory, excessively empathetic, or challenge customers were found to be counterproductive when dealing with negative reviews. This study not only demystifies the art of managing online reviews but also offers an advanced deep learning methodology that can directly benefit the disciplines of Information Systems and Management.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103970"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141027258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Vedadi , Merrill Warkentin , Detmar W. Straub , Jordan Shropshire
{"title":"Fostering information security compliance as organizational citizenship behavior","authors":"Ali Vedadi , Merrill Warkentin , Detmar W. Straub , Jordan Shropshire","doi":"10.1016/j.im.2024.103968","DOIUrl":"https://doi.org/10.1016/j.im.2024.103968","url":null,"abstract":"<div><p>Information security is heightened when employees develop a strong sense of information stewardship for information assets, a form of organizational citizenship behavior, suggesting that compliance should be perceived as a symbiotic relationship between organizations and employees. We conducted a field study by collecting multi-source, match-paired survey data from 487 employees paired with their supervisor's ratings. Results showed that affective commitment, job satisfaction, perceived organizational support, and social influence were positively related to compliance behavior. This research contributes to the information security literature by showing that employees with strong organizational bond are more likely to exhibit higher levels of security policy compliance.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103968"},"PeriodicalIF":9.9,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141078037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}