All entries by this author

The antecedents of employees’ proactive information security behaviour: The perspective of proactive motivation

Nov 23rd, 2023 | By

Abstract Organisational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever-increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organisational security problems. This study therefore focuses on employees’ proactive information security behaviours (ISBs)—behaviours that are self-initiated,
[continue reading…]



An empirical investigation of social comparison and open source community health

Nov 16th, 2023 | By

Abstract It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today’s business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health
[continue reading…]



Accountability mobilization, guanxi and social media?induced polarization: Understanding the bystander’s prosocial punishment to misinformation spreader

Nov 14th, 2023 | By

Abstract Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media
[continue reading…]



Contextualising collective efficacy in virtual team research: The essential role of collaborative technologies in the virtual team efficacy conceptual framework

Nov 8th, 2023 | By

Abstract One factor receiving contemporary interest from virtual team researchers is collective-level efficacy, that is, a team’s shared belief in its collective abilities to work effectively. However, our understanding of this literature leads to two concerns. First, depending on traditional team-focused collective-level efficacy concepts conveys an indifferent view of technology that ignores decades of research
[continue reading…]



Agentic interplay between hybridity and liminality in contemporary boundary work

Nov 1st, 2023 | By

Abstract There is no doubt that digital technologies have an impact on boundary work, that is, the practices individuals develop to work up boundaries between ‘work’ and ‘life’. However, related research is still dominated by the integration–segmentation framework which may restrict our understanding of contemporary practice. To address this limitation, we use the concepts of
[continue reading…]



Visual audience gatekeeping on social media platforms: A critical investigation on visual information diffusion before and during the Russo–Ukrainian War

Oct 29th, 2023 | By

Abstract Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas. However, the advent of social media platforms has disrupted these power dynamics, empowering audiences through user-driven visual information exchanges. This has led to visual audience
[continue reading…]



The ‘hijacking’ of the Scandinavian Journal of Information Systems: Implications for the information systems community

Oct 21st, 2023 | By

Abstract Journal hijacking, which refers to the attempted brand takeover of a journal by a third party, is a nascent threat confronting the information systems (IS) community, as evidenced by cybercriminals having established an online presence, masquerading as the Scandinavian Journal of Information Systems (SJIS). The SJIS hijacking damages the journal’s reputation, leads to payment
[continue reading…]



Ethics I: Authors and their research

Oct 18th, 2023 | By

Information Systems Journal, EarlyView. Source



The impact of social network embeddedness on mobile massively multiplayer online games play

Oct 18th, 2023 | By

Abstract Social factors play a critical role in motivating player participation and commitment to online multiplayer games. Many popular mobile massively multiplayer online games (MMOGs) adopt social network embeddedness (SNE) functions to optimise players’ social play experience. SNE changes the traditional pattern of MMOG social play by porting acquaintance relationships (e.g., Facebook friends) from social
[continue reading…]



When workarounds aggravate misfits in the use of electronic health record systems

Oct 15th, 2023 | By

Abstract This paper contributes to the IS misfits and workarounds literature by demonstrating how “work system–technology” misfits and workarounds can be mutually related. In the context of electronic health record (EHR) systems, this study examines when misfits experienced between an EHR system and health professionals’ work practices lead to workarounds with negative consequences in terms
[continue reading…]