Episodit
-
Digital technology as a boundary object for making sense of time and temporality in hybrid work.
Griva, A., Chandra Kruse, L., Hattinger, M., Högberg, K., Pappas, I. O., & Conboy, K. (2024). Making space for time: Strategies for the design of time‐aware hybrid work. Information Systems Journal. https://doi.org/10.1111/isj.12552 -
Five principles that help us develop situated explanations.
Grisold, T., Kremser, W., Mendling, J., Recker, J., Vom Brocke, J., & Wurm, B. (2024). Generating impactful situated explanations through digital trace data. Journal of Information Technology, 39(1), 2-18. https://doi.org/10.1177/02683962231208724 -
Puuttuva jakso?
-
Building muscle from experiences with confronting crises.
Tremblay, M. C., Kohli, R., & Rivero, C. (2023). 'Data is the New Protein: How the Commonwealth of Virginia Built Digital Resilience Muscle and Rebounded from Opioid and COVID Shocks', MIS Quarterly, vol. 47, no. 1, pp. 423-449. https://doi.org/10.25300/MISQ/2022/17260 -
Doing the right thing can result in bad experiences; doing the wrong thing can result in good experiences.Balozian, P., Burns, A. J., & Leidner, D. E. (2023). 'An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures', Journal of the Association for Information Systems (JAIS), vol. 24, no. 1, pp. 161-221. https://doi.org/10.17705/1jais.00798
-
Two excellent papers from ACIS 2022 in Melbourne, Australia.
Rinaudo, N. B., Matook, S., & Dennis, A. R. (2022). 'Social Media’s Stockholm Syndrome: A Literature Review of User’s Love and Hate', paper presented at the Australasian Conference on Information Systems (ACIS), Melbourne (Australia), paper 127.
Hannon, O., Gal, U., & Dar-Nimrod, I. (2022). 'Aversion vs. Abstinence: Conceptual Distinctions for the Receptivity Toward Algorithmic Decision-Making Systems Within Value-laden Contexts', paper presented at the Australasian Conference on Information Systems (ACIS), Melbourne (Australia), paper 77. -
People often have rational justifications for why they don't follow the cybersecurity policies.
Karjalainen M., Sarker S., & Siponen M. (2019), 'Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective', Information Systems Research, vol. 30, no. 2, pp. 687-704, https://doi.org/10.1287/isre.2018.0827 -
Great outcomes aren't exclusive to shiny new objects.
Paavola L. & Cuthbertson R. (2022), 'Transformative Power of Mundane Technologies in Institutional Change', Hawaii International Conference on System Sciences (HICSS), https://doi.org/10.24251/HICSS.2022.868 -
Everything we know about dynamic capabilities and IS research as of 2022.
Mikalef P., Pateli A. & Ortiz-de-Guinea A. (2022), 'Dynamic Capabilities in Information Systems Research: A Critical Review, Synthesis of Current Knowledge, and Recommendations for Future Research', Journal of the Association for Information Systems (JAIS), https://doi.org/10.17705/1jais.00736 -
In the era of ubiquitous digital technology, our perception of time is undergoing a serious paradigm shift.
Ivaturi and Chua (2021), 'Rethinking Time: Ubichronic Time and Its Impact on Work', European Journal of Information Systems, http://dx.doi.org/10.1080/0960085X.2021.1966326 -
Will there still be a future for human work in the hyper-automated future of algorithmic decision-making?
Grønsund T. & Aanestad M. (2020), 'Augmenting the Algorithm: Emerging Human-in-the-Loop Work Configurations', Journal of Strategic Information Systems, vol. 29, no. 2, https://doi.org/10.1016/j.jsis.2020.101614 -
The different groups of people involved in the Monero cryptocurrency have very different feelings about privacy. How is this going to play out in the design of Monero?
Renwick R. & Gleasure R. (2021), 'Those Who Control the Code Control the Rules: How Different Perspectives of Privacy Are Being Written Into the Code of Blockchain Systems', Journal of Information Technology, https://doi.org/10.1177/0268396220944406 -
In the past, information systems (IS) captured and represented the lived (external) reality. Now, they are the lived reality.
Baskerville R. L., Myers M. D., & Yoo Y. (2020), 'Digital First: The Ontological Reversal and New Challenges for Information Systems Research', MIS Quarterly, https://doi.org/10.25300/MISQ/2020/14418 -
Social media can make people feel envy. But is this always a bad thing? And what does it mean for social media platforms?
Wu J. & Srite M. (2020), 'Envy on Social Media: The Good, the Bad and the Ugly', International Journal of Information Management, https://doi.org/10.1016/j.ijinfomgt.2020.102255 -
The old factory paradigm is fading away, but what will replace it? We look to the digital nomads to envision some possibilities.
Wang B., Schlagwein D., Cecez-Kecmanovic D., & Cahalane M. C. (2020), 'Beyond the Factory Paradigm: Digital Nomadism and the Digital Future(s) of Knowledge Work Post-COVID-19', Journal of the Association for Information Systems, 21(6), pp. 1379-1401, https://aisel.aisnet.org/jais/vol21/iss6/10/ -
The conspiracy theory "QAnon" started in a fringe, esoteric corner of the Web. How did it become part of the mainstream public sphere?
De Zeeuw D., Hagen S., Peeters S., & Jokubauskaite E. (2020), 'Tracing Normiefication: A Cross-Platform Analysis of the QAnon Conspiracy Theory', First Monday, https://doi.org/10.5210/fm.v25i11.10643 -
In Western culture, there's social capital and virtue ethics. In Chinese culture, there's guanxi and qinghuai.
Xiao X., Tan B., Leong C., & Tan F. T. C. (2020), 'Powered by “Qinghuai”: The Melding of Traditional Values and Digital Entrepreneurship in Contemporary China', Information Systems Journal, https://doi.org/10.1111/isj.12301 -
The lockdowns of COVID-19 have seen a sharp increase in the use of web conferencing systems. How have these been useful, and how can we improve on these for the future?
Hacker J., Vom Brocke J., Handali J., Otto M., & Schneider J. (2020), 'Virtually in This Together – How Web-conferencing Systems Enabled a New Virtual Togetherness During the COVID-19 Crisis', European Journal of Information Systems, https://doi.org/10.1080/0960085X.2020.1814680 -
Sometimes people set up their own IT systems outside of what is officially supported by the IT department. When these IT systems are revealed, what happens to them?
Fürstenau D., Rothe H. & Sandner M. (2020), Leaving the Shadow: A Configurational Approach to Explain Post-Identification Outcomes of Shadow IT Systems’, Business & Information Systems Engineering, https://doi.org/10.1007/s12599-020-00635-2 - Näytä enemmän