Discover10 Minute I.S. Paper (TMISP)
10 Minute I.S. Paper (TMISP)
Claim Ownership

10 Minute I.S. Paper (TMISP)

Author: Blair Wang

Subscribed: 3Played: 20
Share

Description

30 Episodes
Reverse
Digital technology as a boundary object for making sense of time and temporality in hybrid work. Griva, A., Chandra Kruse, L., Hattinger, M., Högberg, K., Pappas, I. O., & Conboy, K. (2024). Making space for time: Strategies for the design of time‐aware hybrid work. Information Systems Journal. https://doi.org/10.1111/isj.12552
Five principles that help us develop situated explanations. Grisold, T., Kremser, W., Mendling, J., Recker, J., Vom Brocke, J., & Wurm, B. (2024). Generating impactful situated explanations through digital trace data. Journal of Information Technology, 39(1), 2-18. https://doi.org/10.1177/02683962231208724
Building muscle from experiences with confronting crises. Tremblay, M. C., Kohli, R., & Rivero, C. (2023). 'Data is the New Protein: How the Commonwealth of Virginia Built Digital Resilience Muscle and Rebounded from Opioid and COVID Shocks', MIS Quarterly, vol. 47, no. 1, pp. 423-449. https://doi.org/10.25300/MISQ/2022/17260
Doing the right thing can result in bad experiences; doing the wrong thing can result in good experiences. Balozian, P., Burns, A. J., & Leidner, D. E. (2023). 'An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures', Journal of the Association for Information Systems (JAIS), vol. 24, no. 1, pp. 161-221. https://doi.org/10.17705/1jais.00798
Two excellent papers from ACIS 2022 in Melbourne, Australia. Rinaudo, N. B., Matook, S., & Dennis, A. R. (2022). 'Social Media’s Stockholm Syndrome: A Literature Review of User’s Love and Hate', paper presented at the Australasian Conference on Information Systems (ACIS), Melbourne (Australia), paper 127. Hannon, O., Gal, U., & Dar-Nimrod, I. (2022). 'Aversion vs. Abstinence: Conceptual Distinctions for the Receptivity Toward Algorithmic Decision-Making Systems Within Value-laden Contexts', paper presented at the Australasian Conference on Information Systems (ACIS), Melbourne (Australia), paper 77.
People often have rational justifications for why they don't follow the cybersecurity policies. Karjalainen M., Sarker S., & Siponen M. (2019), 'Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective', Information Systems Research, vol. 30, no. 2, pp. 687-704, https://doi.org/10.1287/isre.2018.0827
Great outcomes aren't exclusive to shiny new objects. Paavola L. & Cuthbertson R. (2022), 'Transformative Power of Mundane Technologies in Institutional Change', Hawaii International Conference on System Sciences (HICSS), https://doi.org/10.24251/HICSS.2022.868
Everything we know about dynamic capabilities and IS research as of 2022. Mikalef P., Pateli A. & Ortiz-de-Guinea A. (2022), 'Dynamic Capabilities in Information Systems Research: A Critical Review, Synthesis of Current Knowledge, and Recommendations for Future Research', Journal of the Association for Information Systems (JAIS), https://doi.org/10.17705/1jais.00736
What do we know about interoperability in the age of digital platforms and ecosystems? Hodapp D. & Hanelt A. (2022), 'Interoperability in the Era of Digital Innovation: An Information Systems Research Agenda', Journal of Information Technology, https://doi.org/10.1177/02683962211064304
It's a little bit more complicated than the good ol' triple-constraint model. Iivari J. (2021), 'A Paradox Lens to Systems Development Projects: The Case of the Agile Software Development', Communications of the Association for Information Systems, vol. 49, https://doi.org/10.17705/1CAIS.04901
In the era of ubiquitous digital technology, our perception of time is undergoing a serious paradigm shift. Ivaturi and Chua (2021), 'Rethinking Time: Ubichronic Time and Its Impact on Work', European Journal of Information Systems, http://dx.doi.org/10.1080/0960085X.2021.1966326
Will there still be a future for human work in the hyper-automated future of algorithmic decision-making? Grønsund T. & Aanestad M. (2020), 'Augmenting the Algorithm: Emerging Human-in-the-Loop Work Configurations', Journal of Strategic Information Systems, vol. 29, no. 2, https://doi.org/10.1016/j.jsis.2020.101614
The different groups of people involved in the Monero cryptocurrency have very different feelings about privacy. How is this going to play out in the design of Monero? Renwick R. & Gleasure R. (2021), 'Those Who Control the Code Control the Rules: How Different Perspectives of Privacy Are Being Written Into the Code of Blockchain Systems', Journal of Information Technology, https://doi.org/10.1177/0268396220944406
In the past, information systems (IS) captured and represented the lived (external) reality. Now, they are the lived reality. Baskerville R. L., Myers M. D., & Yoo Y. (2020), 'Digital First: The Ontological Reversal and New Challenges for Information Systems Research', MIS Quarterly, https://doi.org/10.25300/MISQ/2020/14418
Social media can make people feel envy. But is this always a bad thing? And what does it mean for social media platforms? Wu J. & Srite M. (2020), 'Envy on Social Media: The Good, the Bad and the Ugly', International Journal of Information Management, https://doi.org/10.1016/j.ijinfomgt.2020.102255
The old factory paradigm is fading away, but what will replace it? We look to the digital nomads to envision some possibilities. Wang B., Schlagwein D., Cecez-Kecmanovic D., & Cahalane M. C. (2020), 'Beyond the Factory Paradigm: Digital Nomadism and the Digital Future(s) of Knowledge Work Post-COVID-19', Journal of the Association for Information Systems, 21(6), pp. 1379-1401, https://aisel.aisnet.org/jais/vol21/iss6/10/
The conspiracy theory "QAnon" started in a fringe, esoteric corner of the Web. How did it become part of the mainstream public sphere? De Zeeuw D., Hagen S., Peeters S., & Jokubauskaite E. (2020), 'Tracing Normiefication: A Cross-Platform Analysis of the QAnon Conspiracy Theory', First Monday, https://doi.org/10.5210/fm.v25i11.10643
In Western culture, there's social capital and virtue ethics. In Chinese culture, there's guanxi and qinghuai. Xiao X., Tan B., Leong C., & Tan F. T. C. (2020), 'Powered by “Qinghuai”: The Melding of Traditional Values and Digital Entrepreneurship in Contemporary China', Information Systems Journal, https://doi.org/10.1111/isj.12301
The lockdowns of COVID-19 have seen a sharp increase in the use of web conferencing systems. How have these been useful, and how can we improve on these for the future? Hacker J., Vom Brocke J., Handali J., Otto M., & Schneider J. (2020), 'Virtually in This Together – How Web-conferencing Systems Enabled a New Virtual Togetherness During the COVID-19 Crisis', European Journal of Information Systems, https://doi.org/10.1080/0960085X.2020.1814680
Sometimes people set up their own IT systems outside of what is officially supported by the IT department. When these IT systems are revealed, what happens to them? Fürstenau D., Rothe H. & Sandner M. (2020), Leaving the Shadow: A Configurational Approach to Explain Post-Identification Outcomes of Shadow IT Systems’, Business & Information Systems Engineering, https://doi.org/10.1007/s12599-020-00635-2
loading