The constantly growing pool of smart, connected Internet of Things (IoT) devices poses completely new challenges for business regarding security and privacy. In fact, the widespread adoption of smart products might depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy.
More than 500 articles related to health IT were published in IS journals between 1990 and 2017. While remarkable that such a significant quantity of quality health IT research is being published in IS journals, it is nearly impossible, even for researchers who read in this area regularly, to comprehensively understand what this research has contributed.
Many modern information systems are large and complex. Analyzing or designing them means that IS professionals need to consider multiple perspectives. IS professionals use conceptual models – semi-formal graphical visualizations of real-world domains – to help build their understanding. The number and variety of different models can be large. We do not know how IS professionals can effectively and efficiently choose between different models, use them to develop an understandi...
Opportunism, devious self-interest behavior, is a persistent social problem. Attempts to restrict opportunism, such as legal and ethical codes, have shaped societies for millennia. Opportunism differs from mere profit maximizing because it takes advantage of a trusting relationship to advance self-interest. According to a previous study by three of the authors, a majority of IS consultants and their clients have observed opportunism. Such practices might include breaking promises, being untru...
Pricing and advertisement are two of the most important instruments for online retailers (e-tailers) to attract and compete for customers. At the same time, these two dimensions have a considerable impact on the costs and profitability of such firms. Knowing such strategies and their impacts is key in maintaining competitive advantage. In order to attract customers, it is essential to consider not only consumer behavior and market segment, but also competitor`s strategic response.
Online petitions play an increasingly important role in the political life of many countries. They are a powerful tool for motivating political change, allowing people to easily participate in the political discourse and eventually influence policy- and decision making. Despite their growing popularity, the success rate of online petitions is still regrettably low.
To better understand what differentiates successful from unsuccessful petitions, this paper investigates how textual information...
It is widely accepted that information systems have an influence on performance. However, literature is still in disagreement about the strength and direction of the influence. Does system use affects users’ task performance positively, negatively, or insignificantly? This knowledge gap makes it difficult for us to understand the deeper interrelations between system use and task performance.
The unresolved situation makes it hard for practitioners to justify IT investments by expected ...
Organizations are vulnerable to insider threats when their members conceal information about adverse behaviours. Even members without malicious intent might still conceal potentially adverse behaviours, e.g., non-compliance with security policies. Identifying those cases is very challenging. Organizations have reported how their current measures incur too many false positives, are often too slow or even non-existent.
Online petitions play an increasingly important role in the political life of many countries. They are a powerful tool for motivating political change, allowing people to easily participate in the political discourse and eventually influence policy- and decision making. Despite their growing popularity, the success rate of online petitions is still regrettably low.
To better understand what differentiates successful from unsuccessful petitions, this paper investigates how textual information...
Pricing and advertisement are two of the most important instruments for online retailers (e-tailers) to attract and compete for customers. At the same time, these two dimensions have a considerable impact on the costs and profitability of such firms. Knowing such strategies and their impacts is key in maintaining competitive advantage. In order to attract customers, it is essential to consider not only consumer behavior and market segment, but also competitor`s strategic response.
It is widely accepted that information systems have an influence on performance. However, literature is still in disagreement about the strength and direction of the influence. Does system use affects users’ task performance positively, negatively, or insignificantly? This knowledge gap makes it difficult for us to understand the deeper interrelations between system use and task performance.
The unresolved situation makes it hard for practitioners to justify IT investments by expected ...
Organizations are vulnerable to insider threats when their members conceal information about adverse behaviours. Even members without malicious intent might still conceal potentially adverse behaviours, e.g., non-compliance with security policies. Identifying those cases is very challenging. Organizations have reported how their current measures incur too many false positives, are often too slow or even non-existent.
Many modern information systems are large and complex. Analyzing or designing them means that IS professionals need to consider multiple perspectives. IS professionals use conceptual models – semi-formal graphical visualizations of real-world domains – to help build their understanding. The number and variety of different models can be large. We do not know how IS professionals can effectively and efficiently choose between different models, use them to develop an understandi...
The constantly growing pool of smart, connected Internet of Things (IoT) devices poses completely new challenges for business regarding security and privacy. In fact, the widespread adoption of smart products might depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy.
Opportunism, devious self-interest behavior, is a persistent social problem. Attempts to restrict opportunism, such as legal and ethical codes, have shaped societies for millennia. Opportunism differs from mere profit maximizing because it takes advantage of a trusting relationship to advance self-interest. According to a previous study by three of the authors, a majority of IS consultants and their clients have observed opportunism. Such practices might include breaking promises, being untru...
More than 500 articles related to health IT were published in IS journals between 1990 and 2017. While remarkable that such a significant quantity of quality health IT research is being published in IS journals, it is nearly impossible, even for researchers who read in this area regularly, to comprehensively understand what this research has contributed.
The Journal of the Association for Information Systems (JAIS), the flagship journal of the Association for Information Systems, publishes the highest quality scholarship in the field of information systems. It is inclusive in topics, level and unit of analysis, theory, method and philosophical and research approach, reflecting all aspects of Information Systems globally. The Journal promotes innovative, interesting and rigorously developed conceptual and empirical contributions and encourages theory based multi- or inter-disciplinary research.