Sorry

This feed does not validate.

In addition, interoperability with the widest range of feed readers could be improved by implementing the following recommendation.

Source: http://aisel.aisnet.org/jais/recent.rss

  1. <?xml version="1.0" encoding="utf-8" ?>
  2. <rss version="2.0">
  3. <channel>
  4. <title>Journal of the Association for Information Systems</title>
  5. <copyright>Copyright (c) 2024 Association for Information Systems All rights reserved.</copyright>
  6. <link>https://aisel.aisnet.org/jais</link>
  7. <description>Recent documents in Journal of the Association for Information Systems</description>
  8. <language>en-us</language>
  9. <lastBuildDate>Sun, 05 May 2024 14:11:18 PDT</lastBuildDate>
  10. <ttl>3600</ttl>
  11.  
  12.  
  13.  
  14.  
  15.  
  16.  
  17.  
  18.  
  19.  
  20.  
  21.  
  22.  
  23.  
  24.  
  25.  
  26.  
  27. <item>
  28. <title>About Theory and Theorizing</title>
  29. <link>https://aisel.aisnet.org/jais/vol25/iss3/11</link>
  30. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/11</guid>
  31. <pubDate>Sun, 05 May 2024 14:10:29 PDT</pubDate>
  32. <description>
  33. <![CDATA[
  34. ]]>
  35. </description>
  36.  
  37. <author>Dorothy E. Leidner et al.</author>
  38.  
  39.  
  40. </item>
  41.  
  42.  
  43.  
  44.  
  45. <item>
  46. <title>Organizational Identity Management Policies</title>
  47. <link>https://aisel.aisnet.org/jais/vol25/iss3/10</link>
  48. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/10</guid>
  49. <pubDate>Sun, 05 May 2024 14:10:27 PDT</pubDate>
  50. <description>
  51. <![CDATA[
  52. <p>Effective identity management is essential for secure organizational processes, but organizations often do not approach it strategically. To break this trajectory, organizational policymakers need to define a clear and sustainable identity management strategy. This paper presents an overview and guidelines to help shape such strategy. It analyzes the key characteristics and trade-offs of today’s identity management models. Moreover, it offers practical recommendations for organizational policymakers when choosing among these models.</p>
  53.  
  54. ]]>
  55. </description>
  56.  
  57. <author>Alexander Rieger et al.</author>
  58.  
  59.  
  60. </item>
  61.  
  62.  
  63.  
  64.  
  65. <item>
  66. <title>“My Name is Alexa. What’s Your Name?” The Impact of Reciprocal Self-Disclosure on Post-Interaction Trust in Conversational Agents</title>
  67. <link>https://aisel.aisnet.org/jais/vol25/iss3/9</link>
  68. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/9</guid>
  69. <pubDate>Sun, 05 May 2024 14:10:26 PDT</pubDate>
  70. <description>
  71. <![CDATA[
  72. <p>The use of conversational AI agents (CAs), such as Alexa and Siri, has steadily increased over the past several years. However, the functionality of these agents relies on the personal data obtained from their users. While evidence suggests that user disclosure can be increased through reciprocal self-disclosure (i.e., a process in which a CA discloses information about itself with the expectation that the user would reciprocate by disclosing similar information about themself), it is not clear whether and through which mechanism the process of reciprocal self-disclosure influences users’ post-interaction trust. We theorize that anthropomorphism (i.e., the extent to which a user attributes humanlike attributes to a nonhuman entity) serves as an inductive inference mechanism for understanding reciprocal self-disclosure, enabling users to build conceptually distinct cognitive and affective foundations upon which to form their post-interaction trust. We found strong support for our theory through two randomized experiments that used custom-developed text-based and voice-based CAs. Specifically, we found that reciprocal self-disclosure increases anthropomorphism and anthropomorphism increases cognition-based trustworthiness and affect-based trustworthiness. Our results show that reciprocal self-disclosure has an indirect effect on cognition-based trustworthiness and affect-based trustworthiness and is fully mediated by anthropomorphism. These findings conceptually bridge prior research on motivations of anthropomorphism and research on cognitive and affective bases of trust.</p>
  73.  
  74. ]]>
  75. </description>
  76.  
  77. <author>Kambiz Saffarizadeh et al.</author>
  78.  
  79.  
  80. </item>
  81.  
  82.  
  83.  
  84.  
  85. <item>
  86. <title>Digital Institutionalization: The Case of E-Prescribing</title>
  87. <link>https://aisel.aisnet.org/jais/vol25/iss3/8</link>
  88. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/8</guid>
  89. <pubDate>Sun, 05 May 2024 14:10:25 PDT</pubDate>
  90. <description>
  91. <![CDATA[
  92. <p>Digital institutionalization processes are fundamentally changing society. They occur when rules and norms are encoded into a digital infrastructure and change practices. For institutionalization to occur, numerous actors must alter their behavior similarly, which accompanies a shift in infrastructural technology. Digital infrastructures and their design play a crucial role in institutionalization processes, as they enable and restrict social interaction in the exchange of digital institutional entities across contexts. Such entities are constitutive of digital institutional systems—medical prescriptions, money, insurance, and taxes are all institutional entities that have been digitalized. Although several studies have described the challenges of digital infrastructure design, there has been little consideration of the institutional context that legitimizes the design. To fill this research gap, we applied the critical perspective of designers, who intentionally perform and are responsible for the design and legitimacy of digital institutional systems. To address the challenge of institutional design, we developed an exchange contract within an institutional context featuring a change in digital infrastructure and practices. Through this, we illuminate several design principles for digital institutionalization. This contribution captures critical design decisions and the knowledge acquired through insights gained from the design of a highly impactful scalable digital infrastructure, which ultimately transformed an institutional system. We also provide theoretical reflections informed by speech act theory and institutional theory and thereby emphasize the need to rethink institutionalization processes in an era of digitalization.</p>
  93.  
  94. ]]>
  95. </description>
  96.  
  97. <author>Owen Eriksson et al.</author>
  98.  
  99.  
  100. </item>
  101.  
  102.  
  103.  
  104.  
  105. <item>
  106. <title>The Contingent Effects of IS Certifications on the Trustworthiness of Websites</title>
  107. <link>https://aisel.aisnet.org/jais/vol25/iss3/7</link>
  108. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/7</guid>
  109. <pubDate>Sun, 05 May 2024 14:10:24 PDT</pubDate>
  110. <description>
  111. <![CDATA[
  112. <p>Information systems (IS) research has largely treated IS certifications (i.e., graphical cues that prove the endorsement of independent third parties) as universally effective at improving website visitors’ perceptions of trustworthiness. However, inconclusive findings on the effectiveness of IS certifications on websites have emerged, critically challenging their usefulness. We seek to reconcile these inconclusive findings by drawing on swift trust theory and the notion of humans as cognitive misers. Specifically, we investigate whether the effects of IS certifications are contingent on visitors’ expectations and the website’s baseline trustworthiness (i.e., the original website before adding and visitors’ processing of IS certifications). Through a multistudy investigation combining an online (<em>N</em> = 191) and a follow-up field experiment with up to €4 million in sales volume (<em>N</em> = 306), we reveal the contingent effects of IS certifications on the trustworthiness of websites: Below (but not above) a certain level of a website’s baseline trustworthiness (i.e., the trust tipping point), IS certifications significantly increase trustworthiness. We also show that IS certifications do not increase the likelihood of user registrations (i.e., trust-related behavior) when a website’s baseline trustworthiness surpasses this trustworthiness threshold. Overall, we provide an important new perspective that explains and resolves previous inconsistent findings on the (in)effectiveness of IS certifications for trustworthiness and subsequent trust-related behaviors. We equip practitioners with valuable and actionable guidance on the usefulness of IS certifications to strengthen their digital businesses.</p>
  113.  
  114. ]]>
  115. </description>
  116.  
  117. <author>Martin Adam et al.</author>
  118.  
  119.  
  120. </item>
  121.  
  122.  
  123.  
  124.  
  125. <item>
  126. <title>The Effects of Featuring Product Sampling Reviews on E-Tailer Websites</title>
  127. <link>https://aisel.aisnet.org/jais/vol25/iss3/6</link>
  128. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/6</guid>
  129. <pubDate>Sun, 05 May 2024 14:10:23 PDT</pubDate>
  130. <description>
  131. <![CDATA[
  132. <p>Given the significant influence of online product reviews on consumer purchases, firms are trying to be more proactive in leveraging the influence of reviews. One way of doing this is to offer free product samples to consumers to incentivize product reviews, displaying them along with a disclosure in the existing pool of organic reviews in the hopes of stimulating sales. However, it is not clear whether such product sampling reviews are indeed beneficial to sales, considering that they may have a nontrivial influence on the generation of organic reviews. Based on data from a leading e-commerce platform in China, we found that sponsored product sampling reviews promoted product sales but also reduced the volume of organic reviews for the targeted product. However, the net effect on sales remained positive, suggesting that e-tailers may wish to utilize sponsored product sampling reviews. We also conducted a scenario-based experiment to reveal how the nature of product sampling reviews affects consumers’ brand quality and fairness perceptions. Based on our findings we offer future research directions to improve the understanding of how to better harness the power of sponsored reviews.</p>
  133.  
  134. ]]>
  135. </description>
  136.  
  137. <author>Xianghua Lu et al.</author>
  138.  
  139.  
  140. </item>
  141.  
  142.  
  143.  
  144.  
  145. <item>
  146. <title>The Impact of Feature Exploitation and Exploration on Mobile Application Evolution and Success</title>
  147. <link>https://aisel.aisnet.org/jais/vol25/iss3/5</link>
  148. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/5</guid>
  149. <pubDate>Sun, 05 May 2024 14:10:22 PDT</pubDate>
  150. <description>
  151. <![CDATA[
  152. <p>Mobile device applications are the largest segment of IS with an estimated 5 billion users. Yet despite their widespread and growing use, there is little research examining how these mobile applications evolve with each new release update. To ensure market success, developers need to satisfy their user base by incorporating users’ reviews and feedback on the one hand and exploring new features and content that allow them to stay competitive on the other. Drawing on the organizational learning and innovation literature, the findings of the present study suggest that a mix of these two activities of exploitation and exploration in consequent app updates is likely to result in the app’s success. We further contribute to this body of work by examining the influence of users’ online review characteristics on exploitation and exploration activities in app development. The findings suggest that users’ convergence on similar issues (<em>review concurrence</em>) is likely to favor an orientation prioritizing exploitation over exploration activities, while the number of user reviews (<em>review volume</em>) has a curvilinear relationship with it.</p>
  153.  
  154. ]]>
  155. </description>
  156.  
  157. <author>Shadi Shuraida et al.</author>
  158.  
  159.  
  160. </item>
  161.  
  162.  
  163.  
  164.  
  165. <item>
  166. <title>Don’t Take It Personally:  An Empirical Investigation of Consumer Responses to Explicit Targeting</title>
  167. <link>https://aisel.aisnet.org/jais/vol25/iss3/4</link>
  168. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/4</guid>
  169. <pubDate>Sun, 05 May 2024 14:10:21 PDT</pubDate>
  170. <description>
  171. <![CDATA[
  172. <p>Firms increasingly use consumer information to target and personalize communication with consumers. This paper focuses on explicit targeting, a practice where firms saliently (yet subtly) reveal the information used to target consumers in their advertisement text. How to craft ad messages to convey product benefits without triggering privacy concerns is a nontrivial task. Results from a field experiment reveal that consumers respond negatively to explicit targeting, yet such a negative effect can be partially alleviated by using hedonic instead of utilitarian information framing. In a controlled online experiment, we show that explicit targeting increases consumers’ privacy concerns relative to the perceived benefits of personalization, leading to less positive consumer responses. Interestingly, an extension of the online experiment suggests that providing consumers with a clear description of why they are targeted seems to offset the negative effects of explicit targeting. This study offers important academic implications for the personalization literature and valuable practical insights for firms and policymakers.</p>
  173.  
  174. ]]>
  175. </description>
  176.  
  177. <author>Dimitrios Tsekouras et al.</author>
  178.  
  179.  
  180. </item>
  181.  
  182.  
  183.  
  184.  
  185. <item>
  186. <title>The Role of Online and Geographically Distant Social Networks in Political Decision-Making: Empirical Evidence from the 2016 United States Presidential Election</title>
  187. <link>https://aisel.aisnet.org/jais/vol25/iss3/3</link>
  188. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/3</guid>
  189. <pubDate>Sun, 05 May 2024 14:10:20 PDT</pubDate>
  190. <description>
  191. <![CDATA[
  192. <p>Social ties play a prominent role in individuals’ political decision-making. They influence partisan defections, political participation, voting decisions, and political information acquisition. Much of the literature focuses on personal social networks or geographically close networks. Yet one’s social network might also include acquaintances or other connections in more distant places that are maintained via online networks. In this study, we exploit Facebook’s Social Connectedness Index, which reflects social connections across the United States, and we investigate the role of social connectedness in political decision-making among individuals who are located across distant geographical regions. Our results suggest that social connectedness between counties has a homogenizing effect on voting for the same presidential candidate, either Democratic or Republican. On the other hand, social connectedness is likely to have a differentiating effect on voting for an independent or a third-party candidate. Moreover, this effect is moderated by the socioeconomic characteristics of the counties, such as education, race, population density, household income, industry, and gender composition.</p>
  193.  
  194. ]]>
  195. </description>
  196.  
  197. <author>Ecem Basak et al.</author>
  198.  
  199.  
  200. </item>
  201.  
  202.  
  203.  
  204.  
  205. <item>
  206. <title>Mechanisms for Achieving Ambidexterity  in the Context of Digital Transformation:  Insights from Digital Innovation Labs</title>
  207. <link>https://aisel.aisnet.org/jais/vol25/iss3/2</link>
  208. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/2</guid>
  209. <pubDate>Sun, 05 May 2024 14:10:19 PDT</pubDate>
  210. <description>
  211. <![CDATA[
  212. <p>Digital transformation alters companies’ core value-defining activities. Companies must establish new work practices and change the work environment to create new value propositions leveraging digital technologies. Specifically, to maximize their investments in digital transformation while remaining competitive, they must achieve ambidexterity, which is the capability to balance exploration and exploitation flexibly. More and more companies strive to achieve ambidexterity by establishing digital innovation labs (DILs), where employees explore the opportunities afforded through digital technologies and ensure their successful integration into the main organization. This study analyzes data collected from nine DILs, examining how companies utilize them to achieve organizational ambidexterity. Our analysis reveals a nuanced view on the conceptualization of ambidexterity and how it helps in digital transformation: (1) DILs contribute mainly by transferring employees temporarily from the main organization to the DIL and back. Recombining mechanisms of different theoretical forms of ambidexterity addresses typical issues and tensions stemming from leveraging digital technologies in innovation activities. (2) We find that implementing ambidexterity through organizational design features of DILs provides a successful basis for digital transformation by creating innovations that complement companies’ value propositions with digital technologies.</p>
  213.  
  214. ]]>
  215. </description>
  216.  
  217. <author>Friedrich Holotiuk et al.</author>
  218.  
  219.  
  220. </item>
  221.  
  222.  
  223.  
  224.  
  225. <item>
  226. <title>Creating Collaboration: How Social Movement Organizations Shape Digital Activism to Promote Broader Social Change</title>
  227. <link>https://aisel.aisnet.org/jais/vol25/iss3/1</link>
  228. <guid isPermaLink="true">https://aisel.aisnet.org/jais/vol25/iss3/1</guid>
  229. <pubDate>Sun, 05 May 2024 14:10:17 PDT</pubDate>
  230. <description>
  231. <![CDATA[
  232. <p>Social movement organizations (SMOs) have increasingly embraced <em>digital activism</em>, using social media and networking tools to advocate for a cause, to mobilize globally distributed consumers and pressure businesses to change their practices. Past research primarily focuses on how SMOs have used viral social media posts to prompt businesses to take immediate action on an issue. This article proposes a shift in the discourse to explore how SMOs’ digital activism can promote broader social change through collaborative agreements rather than merely demanding narrow concessions or compliance. We examine the online campaigns of a large international SMO and show how the campaigns influenced three global businesses to alter their environmental practices and industry standards. We find that the SMO used contrasting combinations of content positioning and social networking strategies to mobilize consumers, ultimately achieving collaboration agreements by influencing businesses’ risk perceptions and the potential strategic gains from collaboration with the SMO. The comparative analysis yields insights into how SMOs may vary their digital activism strategies depending on consumers’ loyalty to a business and its offerings, including its products and services. We develop a theoretical perspective that explains why and how consumer loyalty can shape SMOs’ selection of digital activism strategies and the process of achieving collaboration agreements. The findings also advance the literature on digital activism strategies by introducing the notion of ambivalent content positioning and emphasizing the significance of social networking for risk management and sustaining SMOs’ digital activism.</p>
  233.  
  234. ]]>
  235. </description>
  236.  
  237. <author>Shahla Ghobadi et al.</author>
  238.  
  239.  
  240. </item>
  241.  
  242.  
  243.  
  244.  
  245.  
  246. </channel>
  247. </rss>
  248.  
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda