Sorry

This feed does not validate.

In addition, interoperability with the widest range of feed readers could be improved by implementing the following recommendation.

Source: http://aisel.aisnet.org/jais/recent.rss

  1. <?xml version="1.0" encoding="utf-8" ?>
  2. <rss version="2.0">
  3. <channel>
  4. <title>Journal of the Association for Information Systems</title>
  5. <copyright>Copyright (c) 2025 Association for Information Systems All rights reserved.</copyright>
  6. <link>https://aisel.aisnet.org/jais</link>
  7. <description>Recent documents in Journal of the Association for Information Systems</description>
  8. <language>en-us</language>
  9. <lastBuildDate>Wed, 17 Sep 2025 11:00:21 PDT</lastBuildDate>
  10. <ttl>3600</ttl>
  11.  
  12.  
  13.  
  14.  
  15.  
  16.  
  17.  
  18.  
  19. <item>
  20. <title>Digital Responsibility:  Current Perspectives and Future Directions</title>
  21. <link>https://aisel.aisnet.org/jais/vol26/iss5/10</link>
  22. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/10</guid>
  23. <pubDate>Fri, 05 Sep 2025 00:33:14 PDT</pubDate>
  24. <description>
  25. <![CDATA[
  26. <p>The capacity of digital technology to afford both profound benefits and substantial harm means that careful stewardship of the development, deployment, adoption, and appropriation of digital technologies is required through the practice of digital responsibility. Digital responsibility entails three key aspects: accountability for both harmful and beneficial outcomes of engaging with digital technology, the obligation to enable positive outcomes of digitalization while safeguarding against possible negative consequences of the same, and dependability: a continuous commitment to maintaining accountability and obligation in the face of constantly emerging new digital artifacts and the consequences that flow from their deployment. In this editorial, we develop an organizing framework for investigating digital responsibility, identify different ways in which digital responsibility could manifest in IS research and practice, and summarize how the papers included in this special issue advance our understanding of digital responsibility.</p>
  27.  
  28. ]]>
  29. </description>
  30.  
  31. <author>Jan Recker et al.</author>
  32.  
  33.  
  34. </item>
  35.  
  36.  
  37.  
  38.  
  39.  
  40.  
  41. <item>
  42. <title>The Effects of IP Address Revelation on Location-Based Name-Calling and User Engagement: Evidence From a Chinese Online Platform</title>
  43. <link>https://aisel.aisnet.org/jais/vol26/iss5/8</link>
  44. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/8</guid>
  45. <pubDate>Fri, 05 Sep 2025 00:33:13 PDT</pubDate>
  46. <description>
  47. <![CDATA[
  48. <p>IP address revelation policies are a novel IT intervention designed to regulate user behaviors through de-anonymity and, in China, are implemented to curb misinformation. However, these policies may inadvertently encourage online attacks due to revealed geographic information. There is limited theoretical and empirical understanding of how these interventions influence user behaviors. Drawing on social identity theory, we introduce the scenario of “multiple identities” and analyze how individuals attack others—ostensibly because of the revealed geographic identity but fundamentally due to another salient and substantive identity of actual interest. We analyzed identities and attacks using data from Hupu.com, a Reddit-type platform. We observed an increase in location-based name-calling—where users attack others based on revealed geographic information—following Hupu’s implementation of the IP address revelation policy. Name-calling occurred specifically as political attacks and operated through a proxy model—instead of a choice model—of multiple identities, where the geographic identity was correlated with a more salient political identity, reflecting region-specific political stereotypes. Users leveraged this model to launch attacks for practical reasons, such as avoiding censorship. Relatedly, the policy led to a shift in content and a reduction in users’ geographic representation, as increased hostility discouraged in-depth contributions and deterred participation from users in certain regions. These findings suggest digital interventions revealing one identity (e.g., geographic) may unintentionally affect behaviors associated with another identity (e.g., political), emphasizing the need for careful design of interventions to enhance digital responsibility.</p>
  49.  
  50. ]]>
  51. </description>
  52.  
  53. <author>Yuxin Zhang et al.</author>
  54.  
  55.  
  56. </item>
  57.  
  58.  
  59.  
  60.  
  61.  
  62.  
  63. <item>
  64. <title>An Empirical Investigation of Cloud Computing and Environmental Performance of Nations: Implications for Shared Responsibility in Cloud Computing</title>
  65. <link>https://aisel.aisnet.org/jais/vol26/iss5/9</link>
  66. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/9</guid>
  67. <pubDate>Fri, 05 Sep 2025 00:33:13 PDT</pubDate>
  68. <description>
  69. <![CDATA[
  70. <p>Cloud computing separates service users from carbon emission sources, obscuring IT’s ecological responsibility across national boundaries. This study dissects the digital responsibility of cloud computing, with a focus on obligations and accountability, to address its impact on the environment. To identify direct emitters and beneficiaries of pollution resulting from cloud computing and define the associated obligations, we estimate how cloud computing alters the energy and carbon intensities of IT capital and services in cloud region countries hosting data centers, as well as in neighboring countries. Using country-level data on IT capital stock and IT service expenditures for 51 countries from 1995 to 2016, combined with data on geographical proximity to cloud regions of global public cloud services, our results show that in cloud region countries, the environmental benefits of cloud-based IT services come at the expense of increased energy and carbon intensities from the IT capital providing those services. Conversely, neighboring countries seem to benefit from cloud services that generate pollution in cloud region countries, as evidenced by lower energy and carbon intensities in cloud-based IT services, without compromising their own environmental performance. Our findings suggest that both cloud service hosting and using countries share obligations for the environmental impacts of cloud computing. Building on our empirical findings, we discuss implications for accountability in cloud computing to facilitate the fulfillment of these obligations. We propose a shared responsibility model that allocates accountability between service providers and users, advancing the discourse on cloud computing responsibility and outlining directions for future research.</p>
  71.  
  72. ]]>
  73. </description>
  74.  
  75. <author>Jooho Kim et al.</author>
  76.  
  77.  
  78. </item>
  79.  
  80.  
  81.  
  82.  
  83.  
  84.  
  85. <item>
  86. <title>Navigating Value Conflicts: How Developers at Varied Levels of Moral Development Approach Decision-Making in Information Systems Development</title>
  87. <link>https://aisel.aisnet.org/jais/vol26/iss5/7</link>
  88. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/7</guid>
  89. <pubDate>Fri, 05 Sep 2025 00:33:12 PDT</pubDate>
  90. <description>
  91. <![CDATA[
  92. <p>Information systems development frequently involves value conflicts (e.g., reconciling compliance requirements with user autonomy), thereby requiring developers to engage in moral decision-making regarding what is desirable, right, and just. Drawing on the theory of moral development, this study examines how developers—whose moral reasoning emphasizes self-interest (pre-conventional), maintaining social norms (conventional), or higher-order principles (post-conventional)—navigate these conflicts. We identify varying moral decision-making patterns among developers at the pre-conventional, conventional, and post-conventional levels, structured around four interrelated themes: (1) problem framing, (2) solution conceptualization, (3) responsibility orientation, and (4) duty fulfillment. Our analysis further indicates the pivotal role of developers’ responsibility orientation in guiding moral decision-making. Specifically, this orientation encompasses how developers attribute causal responsibility (e.g., assigning blame) in framing problems, allocate accountability (e.g., taking ownership) in conceptualizing solutions, and balance obligations (e.g., honoring commitments) in fulfilling their duties. Thus, our study shows how distinct responsibility orientations among IS developers at the pre-conventional, conventional, and post-conventional levels critically shape their navigation of value conflicts, ultimately influencing project outcomes.</p>
  93.  
  94. ]]>
  95. </description>
  96.  
  97. <author>Khalid Durani et al.</author>
  98.  
  99.  
  100. </item>
  101.  
  102.  
  103.  
  104.  
  105.  
  106.  
  107. <item>
  108. <title>Responsible AI Design: The Authenticity, Control, Transparency Theory</title>
  109. <link>https://aisel.aisnet.org/jais/vol26/iss5/6</link>
  110. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/6</guid>
  111. <pubDate>Fri, 05 Sep 2025 00:33:11 PDT</pubDate>
  112. <description>
  113. <![CDATA[
  114. <p>Rapid advancements in artificial intelligence (AI) have heightened the need for ethical AI design principles, positioning responsible AI at the forefront across academia, industry, and policy spheres. Despite the plethora of guidelines, responsible AI faces challenges due to fragmentation and the lack of a cohesive explanatory theory guiding research and practice. Existing AI literature frequently fixates on responsible AI attributes within usage contexts, operating under the misapprehension that responsibility can be achieved solely through specific system attributes, responsible algorithms, or minimization of harm. This narrow focus neglects the mechanisms that interlace design decisions with the realization of responsible AI, thereby undervaluing their profound significance. Similarly, information systems literature predominantly emphasizes the operation and usage of these systems, often bypassing the opportunity to weave ethical principles into AI design from its inception. In response, this study adopted a grounded theory approach to theorize responsible AI design from the perspective of AI designers. The authenticity, control, transparency (ACT) theory of responsible AI design emerged as a result. This theory posits that authenticity, control, and transparency are pivotal mechanisms in responsible AI design. These mechanisms ensure that ethical design decisions across three domains—architecture, algorithms, and affordances—translate into responsible AI. The ACT theory offers a parsimonious yet practical foundation for guiding research and practice, aligning ethical AI design with technological advancements and fostering accountability, including algorithmic accountability.</p>
  115.  
  116. ]]>
  117. </description>
  118.  
  119. <author>Andrea Rivera et al.</author>
  120.  
  121.  
  122. </item>
  123.  
  124.  
  125.  
  126.  
  127.  
  128.  
  129. <item>
  130. <title>What Goals Drive Employees’ Information Systems Security Behaviors?  A Mixed Methods Study of Employees’  Goals in the Workplace</title>
  131. <link>https://aisel.aisnet.org/jais/vol26/iss5/5</link>
  132. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/5</guid>
  133. <pubDate>Fri, 05 Sep 2025 00:33:10 PDT</pubDate>
  134. <description>
  135. <![CDATA[
  136. <p>IT security remains high on the agenda of CIOs, with employees’ adoption of security behaviors—behaviors that employees adopt to protect organizational IT assets—being a top concern. To explain when employees adopt security behaviors, the information systems security (ISec) literature has mainly employed deductive studies that draw on theory-based assumptions about goals—mostly from behavioral theories used in criminology and public health (e.g., avoiding sanctions, avoiding harm from threats, avoiding disapproval and blame). However, as these theories typically do not theorize about employees’ goals specific to the workplace, they offer limited insights into the goals that employees pursue at work. Subsequently, not much is known about the goals that motivate employees’ security behaviors at work. Against this backdrop, this research provides a complementary, inductive-first inquiry into the work-related goals that drive employees’ security behaviors. Using a qualitative-quantitative mixed methods research design, we identify four goals (Study 1) and evaluate their importance for predicting employee security behaviors (Study 2). Overall, we find evidence that employees’ work performance and blame avoidance goals are the most salient predictors of security behaviors; as a result, our findings suggest that employees engage in security behaviors primarily because they believe it will help them meet supervisors’ expectations—a key goal that has been largely ignored in the previous ISec literature.</p>
  137.  
  138. ]]>
  139. </description>
  140.  
  141. <author>Sebastian Schuetz et al.</author>
  142.  
  143.  
  144. </item>
  145.  
  146.  
  147.  
  148.  
  149.  
  150.  
  151. <item>
  152. <title>CIO Structural Power and Corporate Social Performance</title>
  153. <link>https://aisel.aisnet.org/jais/vol26/iss5/4</link>
  154. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/4</guid>
  155. <pubDate>Fri, 05 Sep 2025 00:33:09 PDT</pubDate>
  156. <description>
  157. <![CDATA[
  158. <p>Drawing on the structural power framework and the resource management theory, we examine the influence of chief information officer (CIO) structural power on corporate social responsibility. Our empirical analysis shows that CIO structural power enhances corporate social performance (CSP) by fostering an innovative organizational culture. In addition, we find that CIO structural power amplifies the positive relationships between financial resource availability and CSP, as well as between employee productivity and CSP. These findings remain consistent across multiple robustness tests. By highlighting the multifaceted impact of CIO structural power on CSP, we aim to advance understanding of CIOs’ strategic role in corporate social responsibility.</p>
  159.  
  160. ]]>
  161. </description>
  162.  
  163. <author>Cong Feng et al.</author>
  164.  
  165.  
  166. </item>
  167.  
  168.  
  169.  
  170.  
  171.  
  172.  
  173. <item>
  174. <title>Unlocking the Power of User Tie Strength: A Multistudy on Cross-Platform Content Sharing Behaviors</title>
  175. <link>https://aisel.aisnet.org/jais/vol26/iss5/3</link>
  176. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/3</guid>
  177. <pubDate>Fri, 05 Sep 2025 00:33:08 PDT</pubDate>
  178. <description>
  179. <![CDATA[
  180. <p>Social media platforms such as Facebook and WeChat are fiercely competing for a limited pool of social media ad revenue. One pivotal competing battlefield revolves around populating their platforms with compelling and engaging content to increase user stickiness. Until now, extant literature has offered scant insights into potential differences in content-sharing preferences in a multiplatform context and underlying motivations and intricacies. To advance this line of research, this paper contextualizes and extends the self-presentation theory to unveil how the sharing of vice versus virtue content systematically varies with the strength of relationships (tie strength). This intricate phenomenon is meticulously examined through a field study across two distinct social media platforms and three carefully designed laboratory experiments. Notably, we found that social media users lean toward sharing vice content with their strong ties out of the desire to be liked, while they opt for virtue content with their weak ties to fulfill their desire for respect. Ushering in a supplementary layer of complexity, our research unveils online social exclusion as a pervasive yet often overlooked moderating force that challenges the fundamental assumption of self-presentation theory and defines its boundary condition. The findings of this study also carry important implications for social media companies to design effective measures to nurture engaging user content and for general businesses to make better digital marketing decisions.</p>
  181.  
  182. ]]>
  183. </description>
  184.  
  185. <author>Jie Su et al.</author>
  186.  
  187.  
  188. </item>
  189.  
  190.  
  191.  
  192.  
  193.  
  194.  
  195. <item>
  196. <title>From Links to Likes: Evidence From a Social Commerce Platform</title>
  197. <link>https://aisel.aisnet.org/jais/vol26/iss5/2</link>
  198. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/2</guid>
  199. <pubDate>Fri, 05 Sep 2025 00:33:07 PDT</pubDate>
  200. <description>
  201. <![CDATA[
  202. <p>Product-related content created by social media influencers plays a crucial role in shaping consumer purchase decisions. Social media endorsements, as reflected in “likes,” serve as a key indicator of an influencer’s success and provide brands and platforms with valuable insights into how social media users perceive and engage with product-related content. This study theorizes and examines how and why incorporating a product link into influencer-generated content affects individuals’ social media endorsement behavior. Our empirical analysis, based on 216,973 product-related posts from 6,188 influencers on a social media platform, suggests that (1) the inclusion of a product link is associated with more social media endorsement, (2) this effect is more pronounced for organic (non-sponsored) content than for sponsored content, and (3) product links are more effective in increasing social media endorsements for influencers who generate content more intensively (i.e., frequently). To examine the underlying mechanisms driving these effects, we conducted a controlled experiment simulating our research context (<em>N</em> = 428). The findings suggest that the positive effect of product links on social media endorsement arises from enhancing perceptions of helpfulness while mitigating perceptions of ulterior motives, particularly in organic content. This research makes significant theoretical contributions to the literature on user-generated content, user engagement, and influencer marketing, offering actionable guidance for influencers, brands, and social media platforms.</p>
  203.  
  204. ]]>
  205. </description>
  206.  
  207. <author>Xiaoye Cheng et al.</author>
  208.  
  209.  
  210. </item>
  211.  
  212.  
  213.  
  214.  
  215.  
  216.  
  217. <item>
  218. <title>GASP: A Graph Augmentation-Based Approach for Sign Prediction of Ties in Social Networks</title>
  219. <link>https://aisel.aisnet.org/jais/vol26/iss5/1</link>
  220. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss5/1</guid>
  221. <pubDate>Fri, 05 Sep 2025 00:33:05 PDT</pubDate>
  222. <description>
  223. <![CDATA[
  224. <p>This paper proposes a method for the sign prediction of ties in social networks using a design science research process. The proposed method is grounded in social network analysis and leverages the tenets of graph augmentation and a graph regularized framework for information diffusion. To the best of our knowledge, this is the first study that develops a sign prediction method for social networks based on the principles of design science research. This study makes several contributions. We demonstrate the utility and applicability of the proposed method for predicting trust/distrust on a user-user network created from the IMDb platform, which represents ties between reviewers based on their movie evaluation preferences. We describe and discuss the novel aspects of graph augmentation, symmetric normalization of the affinity matrix, and graph regularized label propagation, and discuss their synergistic use to predict the signs of network ties. We also establish the effectiveness of the proposed method by comparing its performance with two different metrics for balanced networks and two metrics for unbalanced networks using four state-of-the-art methods. The benchmarking networks used for experiments originate from online platforms such as Slashdot, Epinions, Wikipedia, and the Yeast Genetic Interaction Network from the biology domain. Experiments show that the proposed method provides significant performance improvements in the sign prediction of ties in social networks. This study provides valuable insights for social media platform owners seeking to improve their platforms by building new features and business leaders seeking to target advertisements and personalized content to users. We also discuss the theoretical, practical, and societal implications of this research.</p>
  225.  
  226. ]]>
  227. </description>
  228.  
  229. <author>Mukul Gupta et al.</author>
  230.  
  231.  
  232. </item>
  233.  
  234.  
  235.  
  236.  
  237.  
  238.  
  239. <item>
  240. <title>Journal of the Association for Information Systems, 25 Years In:  Letting a Thousand Flowers Bloom and Keeping the Fences</title>
  241. <link>https://aisel.aisnet.org/jais/vol26/iss4/10</link>
  242. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/10</guid>
  243. <pubDate>Fri, 04 Jul 2025 13:49:56 PDT</pubDate>
  244. <description>
  245. <![CDATA[
  246. ]]>
  247. </description>
  248.  
  249. <author>Monideepa Tarafdar et al.</author>
  250.  
  251.  
  252. </item>
  253.  
  254.  
  255.  
  256.  
  257.  
  258.  
  259. <item>
  260. <title>Corporate Nomads: Working at the Boundary Between Corporate Work and Digital Nomadism</title>
  261. <link>https://aisel.aisnet.org/jais/vol26/iss4/9</link>
  262. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/9</guid>
  263. <pubDate>Fri, 04 Jul 2025 13:49:55 PDT</pubDate>
  264. <description>
  265. <![CDATA[
  266. <p>Digital nomads are knowledge workers who leverage information technology (IT) to perpetually travel while working independently of any organizational membership. Corporate nomads are individuals who adopt a nomadic lifestyle but remain permanent employees, which places them in a field of tension between corporate work and digital nomadism—two conceptions of work previously deemed incompatible. To resolve this professional paradox, we conducted qualitative interviews with corporate nomads to better understand how they succeeded (or failed) in holding together two disparate fields with competing values and worldviews. Drawing on ideas from the boundary work literature, we developed a process model of boundary coworking in the context of corporate nomadism. The model incorporates the finding that corporate nomadism unfolds along three phases: (1) splintering, (2) calibrating, and (3) harmonizing. This requires mutual engagement in IT-driven boundary work from both the corporate nomad and their organizational environment. Consequently, corporate nomadism can be understood as an extreme form of “working from anywhere” in which individuals work as spatiotemporal outliers within otherwise settled organizational structures. Practitioners may find value in this study because it discusses managerial implications for recruiting, leading, and retaining corporate nomads.</p>
  267.  
  268. ]]>
  269. </description>
  270.  
  271. <author>Julian Marx et al.</author>
  272.  
  273.  
  274. </item>
  275.  
  276.  
  277.  
  278.  
  279.  
  280.  
  281. <item>
  282. <title>Persuading Chronically Ill Patients to Subscribe to Medical Services in Physician-Driven Online Health Communities</title>
  283. <link>https://aisel.aisnet.org/jais/vol26/iss4/8</link>
  284. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/8</guid>
  285. <pubDate>Fri, 04 Jul 2025 13:49:53 PDT</pubDate>
  286. <description>
  287. <![CDATA[
  288. <p>While patient-driven online health communities (OHCs) have long been a fixture of the online healthcare landscape, physician-driven OHCs are becoming increasingly popular. Drawing on the persuasive communication literature, this study takes a physician’s perspective to examine how physicians signal their professional expertise and caring demeanor through online responses and influence patient medical service subscription decisions. By analyzing textual and image data collected from a leading physician-driven OHC, we found that regarding message framing, caring messages (emotional appeals) significantly boosted subscriptions among chronically ill patients, while technical messages (rational appeals) did not. The results were found to be the opposite for source framing: authoritative reputation (rational appeals) had a significant effect but smiling images (emotional appeals) did not. The results also punctuate the importance of congruence between message and source and between text and image in both rational and emotional appeals. Our findings make significant theoretical contributions and offer guidance for physicians seeking to optimize their OHC participation to enhance chronic disease care.</p>
  289.  
  290. ]]>
  291. </description>
  292.  
  293. <author>Yan Li et al.</author>
  294.  
  295.  
  296. </item>
  297.  
  298.  
  299.  
  300.  
  301.  
  302.  
  303. <item>
  304. <title>Data Control Coordination in the Formation of Ecosystems in Highly Regulated Sectors</title>
  305. <link>https://aisel.aisnet.org/jais/vol26/iss4/7</link>
  306. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/7</guid>
  307. <pubDate>Fri, 04 Jul 2025 13:49:52 PDT</pubDate>
  308. <description>
  309. <![CDATA[
  310. <p>Ecosystems in highly regulated sectors such as banking are orchestrated through institutional policies and technical standards that ensure the interoperability of cloud service infrastructures. Despite such interoperability, actors must still coordinate distributed data control to guarantee that data are treated under equal conditions. Drawing on a case study of the Italian banking sector between 2009 and 2020, we investigate the coordination efforts of ecosystem actors in distributing data control across organizational boundaries and jurisdictions. We show that, despite the availability of interoperability standards, the distribution of data control creates tensions that, on the one hand, hinder integration efforts and, on the other hand, allow disproportionate value capture, together contributing to ecosystem failures. We introduce a process model that details how contractual and procedural coordination mechanisms can mitigate these tensions and facilitate value co-creation. We conclude with a discussion of the contributions and implications of our findings for further research on data control coordination.</p>
  311.  
  312. ]]>
  313. </description>
  314.  
  315. <author>Paolo Spagnoletti et al.</author>
  316.  
  317.  
  318. </item>
  319.  
  320.  
  321.  
  322.  
  323.  
  324.  
  325. <item>
  326. <title>Capturing the “Social” in Social Networks: The Conceptualization and Empirical Application of Relational Quality</title>
  327. <link>https://aisel.aisnet.org/jais/vol26/iss4/6</link>
  328. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/6</guid>
  329. <pubDate>Fri, 04 Jul 2025 13:49:51 PDT</pubDate>
  330. <description>
  331. <![CDATA[
  332. <p>Social networks are omnipresent in both our private and professional lives. As social beings, we thrive on technology’s ability to allow us to be social. But just because online social networks have been designed for “being social” as their name suggests, it does not mean they are actually supportive and representative of the rich social interchanges that take place when individuals communicate in a physical setting. Grounded in relational social capital and relational sociology, we examine the aspect of relational quality—a concept that has been neglected thus far in the bigger picture of social networks. Relational quality describes the richness of the relationship that develops between individuals through social interactions. Since current approaches to social networks mostly focus on structural and cognitive properties, our aim is to derive four theoretically motivated markers for relational quality, comprising markers for being personal, being curious, being respectful, and sharing with others, that—conceptually as well as methodologically—complement existing social network measures. By analyzing more than 440,000 messages posted by more than 24,000 employees across two enterprise social networks (ESN), we illustrate and validate the existence of relational quality in social networks, using sample measures for each marker. We further uncover important relationships between different forms of structural embeddedness and our dimensions of relational quality in online networks.</p>
  333.  
  334. ]]>
  335. </description>
  336.  
  337. <author>Christian Meske et al.</author>
  338.  
  339.  
  340. </item>
  341.  
  342.  
  343.  
  344.  
  345.  
  346.  
  347. <item>
  348. <title>Why Do We Follow Virtual Influencer Recommendations?  Three Theoretical Explanations from Brain Data  Tested with Self-Reports</title>
  349. <link>https://aisel.aisnet.org/jais/vol26/iss4/5</link>
  350. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/5</guid>
  351. <pubDate>Fri, 04 Jul 2025 13:49:50 PDT</pubDate>
  352. <description>
  353. <![CDATA[
  354. <p>Virtual influencers have received significant recent research attention. Past work has investigated users’ perceptions of their human-likeness, uncanniness, trust, and ability to persuade. However, the findings are mixed, motivating new theoretical approaches and investigations into the antecedents of the typically utilized variables. We thus took an exploratory, inductive approach by conducting two neuroimaging experiments with complementary brain imaging techniques and then derived theoretical explanations based on the findings. We discovered three key antecedents that impact human and virtual influencer evaluations: (1) expectancy violation, (2) emotion, and (3) cognitive effort. To validate their explanatory power, we tested their effects on the intention to follow influencer recommendations using uncanniness, trust and distrust as serial mediators in a third behavioral study. Results confirm our interpretation of neural results and reveal three explanatory paths towards following intentions with human and virtual influencers: expectancy violation → uncanniness; emotion → trust/distrust; and cognitive effort → follow intentions. Given the lack of theorizing on expectancy violation, emotion, and cognitive effort in the existing research on virtual influencers, we offer a significant theoretical contribution to the field by showing how these features fundamentally predict further evaluations. Our results can guide design theories for the creation of virtual influencer accounts, help companies to better evaluate the predictors for successful virtual influencer marketing, and inform future information systems studies interested in taking an exploratory, inductive approach using neurophysiological data.</p>
  355.  
  356. ]]>
  357. </description>
  358.  
  359. <author>Anika Nissen et al.</author>
  360.  
  361.  
  362. </item>
  363.  
  364.  
  365.  
  366.  
  367.  
  368.  
  369. <item>
  370. <title>How Sentiment Divergence in Influencers’ Multimodal Social Media Posts Shapes Follower Engagement?</title>
  371. <link>https://aisel.aisnet.org/jais/vol26/iss4/4</link>
  372. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/4</guid>
  373. <pubDate>Fri, 04 Jul 2025 13:49:49 PDT</pubDate>
  374. <description>
  375. <![CDATA[
  376. <p>The growing prominence of social media (SM) influencers as key content creators on SM platforms highlights the need for a nuanced understanding of factors that drive follower engagement. Taking a sentiment-theoretic perspective, we examine the interplay between image and text sentiment in multimodal SM posts to show that alignment with followers’ sentiment consistency expectations is crucial for enhanced follower engagement with influencers’ SM posts. Drawing on expectation disconfirmation and negativity bias theories, we explore the impact of sentiment divergence in multimodal SM posts and the moderating role of the follower community’s duality tolerance on follower engagement. Analyzing a dataset of 24,000 Instagram posts, our findings suggest that sentiment divergence between the image and text within the same SM post can reduce follower engagement. Specifically, when the text sentiment is less positive than the image sentiment (negative divergence), the detrimental impact on engagement is notably more pronounced, while posts where the text sentiment is more positive than the image sentiment (positive divergence) appear to be less affected. Additionally, we find that higher duality tolerance within an influencer’s community mitigates the negative effects of sentiment divergence on follower engagement. Our research contributes to the SM literature by highlighting the importance of sentiment divergence for SM influencers and their SM community’s duality tolerance orientation when they are designing posts. We further provide practical insights on how to craft multimodal SM posts that are effective in enhancing follower engagement.</p>
  377.  
  378. ]]>
  379. </description>
  380.  
  381. <author>Reza Alibakhshi et al.</author>
  382.  
  383.  
  384. </item>
  385.  
  386.  
  387.  
  388.  
  389.  
  390.  
  391. <item>
  392. <title>Examining Solver Performance in Crowdsourcing Contests: Does Ambidexterity Matter?</title>
  393. <link>https://aisel.aisnet.org/jais/vol26/iss4/3</link>
  394. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/3</guid>
  395. <pubDate>Fri, 04 Jul 2025 13:49:48 PDT</pubDate>
  396. <description>
  397. <![CDATA[
  398. <p>The performance of solvers is crucial to the success of crowdsourcing contest platforms. Sustained solver performance entails a combination of exploration and exploitation activities, i.e., solver ambidexterity. However, it can be arduous for solvers to engage in ambidexterity with limited knowledge of what its optimal levels are and little research informing this topic. Thus, this study examines the relationship between solver ambidexterity and performance, which is stated to be positive for workers in organizational research. We challenge this assumption and propose that the costs associated with ambidexterity will limit its efficacy beyond a certain level—i.e., we hypothesize an inverted U-shaped relationship between ambidexterity and solver performance. Moreover, how contest conditions shape this relationship is unclear. Drawing on the bounded rationality model, we hypothesize three moderators of the relationship, i.e., task reward, task diversity, and in-process feedback. We tested our model using a panel dataset of solvers from a major crowdsourcing contest platform. Our results support the inverted U-shaped relationship between solvers’ ambidexterity and performance. We find that the highest-performing solver cluster showed a ratio of 5.33 exploitation activities to 1 exploration activity, contradicting the prior premise that both activities are required to a similar extent. Additionally, task diversity and task reward are found to steepen the inverted U curve, while in-process feedback flattens the curve. Our study contributes to theoretical knowledge of the relationship between solvers’ ambidexterity and performance and its contingent conditions. The results also offer novel insights for solvers and platforms to manage ambidexterity and the trade-offs between exploration and exploitation.</p>
  399.  
  400. ]]>
  401. </description>
  402.  
  403. <author>Hua (Jonathan) Ye et al.</author>
  404.  
  405.  
  406. </item>
  407.  
  408.  
  409.  
  410.  
  411.  
  412.  
  413. <item>
  414. <title>Virtual Reality, Mental Models, and Mindful Decision-Making</title>
  415. <link>https://aisel.aisnet.org/jais/vol26/iss4/2</link>
  416. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/2</guid>
  417. <pubDate>Fri, 04 Jul 2025 13:49:46 PDT</pubDate>
  418. <description>
  419. <![CDATA[
  420. <p>This research investigates virtual reality presentation (VR), revealing its impact on users’ mental models and mindful decision-making. We identify two fundamental features of VR: interactive viewing and depth cues. Through the lens of mental model theory, we explore how these two features shape users’ mental models and subsequently influence their mindfulness in decision-making. Two lab experiments were conducted to examine our research model. Study 1 examines interactive viewing and depth cues separately to assess their distinct impacts on the key components of users’ mental models—perceived control and acquired information. Study 2 employs an integrated VR presentation technology (i.e., Meta Quest 2) to explore the overall effect of VR presentations on users’ mental models and mindful decision-making. Results largely support our hypotheses. This research highlights the unique effects of VR presentation and its features, emphasizing enhanced user control and information acquisition in fostering high-quality mental models that increase mindfulness in users’ decisions in the online environment. These findings have significant implications for both research and practice of VR presentations.</p>
  421.  
  422. ]]>
  423. </description>
  424.  
  425. <author>Heshan Sun et al.</author>
  426.  
  427.  
  428. </item>
  429.  
  430.  
  431.  
  432.  
  433.  
  434.  
  435. <item>
  436. <title>Empowering Marginalized Communities: A Framework for Social Inclusion</title>
  437. <link>https://aisel.aisnet.org/jais/vol26/iss4/1</link>
  438. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol26/iss4/1</guid>
  439. <pubDate>Fri, 04 Jul 2025 13:49:45 PDT</pubDate>
  440. <description>
  441. <![CDATA[
  442. <p>Social inclusion—the ability to participate fully in one’s social world—is gaining importance in policy and academic circles. Information systems research has shown how addressing digital divides and expanding individual capabilities could increase the inclusion of marginalized groups. Yet while these contributions are notable, much of early research often overlooked the deep-seated power relations embedded in social structures—organized patterns of relationships, norms, and institutions that perpetuate inequalities and hierarchies based on gender, race, ethnicity, and caste. However, the field has evolved to bring a more nuanced understanding of how social inclusion can be achieved during the implementation of digital projects. Building on these emerging insights, in this paper, we explore how a social infomediary—an intermediary addressing social issues through information provision to marginalized communities—uses a digitally enabled agriculture extension project to build social inclusion in communities. Drawing on a qualitative case study of a social intermediary in India, our research highlights the role of social context in facilitating and constraining social inclusion efforts. Based on our findings, we develop a <em>4R social inclusion framework for digital development projects</em> that shows the importance of recognition, reposition, representation, and reciprocation in fostering social inclusion. We also identify corresponding processes: transformative narratives and dialogues, empathic scaffolding, structured discursive spaces, and innovative interdependence. We discuss the practical and theoretical implications of our research and provide future research directions.</p>
  443.  
  444. ]]>
  445. </description>
  446.  
  447. <author>Israr Qureshi et al.</author>
  448.  
  449.  
  450. </item>
  451.  
  452.  
  453.  
  454.  
  455.  
  456. </channel>
  457. </rss>
  458.  
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda