AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & IoT SME & IT Management Platform Ecosystems & Strategy Cybersecurity & Risk AI Applications & Technologies Healthcare & Well-being Digital Work & Collaboration
Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir)responsibility and Information Security Performance

Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir)responsibility and Information Security Performance

Qian Wang, Dan Pienta, Shenyang Jiang, Eric W. T. Ngai, Jason Bennett Thatcher
This study investigates the relationship between a company's social performance toward its employees and its information security outcomes. Using an eight-year analysis of publicly listed firms and a scenario-based experiment, the research examines how both positive actions (employee-related Corporate Social Responsibility) and negative actions (employee-related Corporate Social Irresponsibility) affect a firm's security risks.

Problem Information security breaches are frequently caused by human error, which often stems from a misalignment between employee goals and a firm's security objectives. This study addresses the gap in human-centric security strategies by exploring whether improving employee well-being and social treatment can align these conflicting interests, thereby reducing security vulnerabilities and data breaches.

Outcome - A firm's engagement in positive, employee-related corporate social responsibility (CSR) is associated with reduced information security risks.
- Conversely, a firm's involvement in socially irresponsible activities toward employees (CSiR) is positively linked to an increase in security risks.
- The impact of these positive and negative actions on security is amplified when the actions are unique compared to industry peers.
- Experimental evidence confirmed that these effects are driven by changes in employees' security commitment, willingness to monitor peers for security compliance, and overall loyalty to the firm.
Information Security, Data Breach, Employee-Related Social Performance, Corporate Social Responsibility, Agency Theory, Cybersecurity Risk
What Is Augmented? A Metanarrative Review of AI-Based Augmentation

What Is Augmented? A Metanarrative Review of AI-Based Augmentation

Inès Baer, Lauren Waardenburg, Marleen Huysman
This paper conducts a comprehensive literature review across five research disciplines to clarify the concept of AI-based augmentation. Using a metanarrative review method, the study identifies and analyzes four distinct targets of what AI augments: the body, cognition, work, and performance. Based on this framework, the authors propose an agenda for future research in the field of Information Systems.

Problem In both academic and public discussions, Artificial Intelligence is often described as a tool for 'augmentation' that helps humans rather than replacing them. However, this popular term lacks a clear, agreed-upon definition, and there is little discussion about what specific aspects of human activity are the targets of this augmentation. This research addresses the fundamental question: 'What is augmented by AI?'

Outcome - The study identified four distinct metanarratives, or targets, of AI-based augmentation: the body (enhancing physical and sensory functions), cognition (improving decision-making and knowledge), work (creating new employment opportunities and improving work practices), and performance (increasing productivity and innovation).
- Each augmentation target is underpinned by a unique human-AI configuration, ranging from human-AI symbiosis for body augmentation to mutual learning loops for cognitive augmentation.
- The paper reveals tensions and counternarratives for each target, showing that augmentation is not purely positive; for example, it can lead to over-dependence on AI, deskilling, or a loss of human agency.
- The four augmentation targets are interconnected, creating potential conflicts (e.g., prioritizing performance over meaningful work) or dependencies (e.g., cognitive augmentation relies on augmenting bodily senses).
Augmentation, Artificial Intelligence, Human-AI Interaction, Metanarrative Review, Cognitive Augmentation, Work Augmentation, Organizational Performance
Corporate Nomads: Working at the Boundary Between Corporate Work and Digital Nomadism

Corporate Nomads: Working at the Boundary Between Corporate Work and Digital Nomadism

Julian Marx, Milad Mirbabaie, Stefan Stieglitz
This study explores the emerging phenomenon of 'corporate nomads'—individuals who maintain permanent employment while adopting a nomadic, travel-based lifestyle. Through qualitative interviews with 37 corporate nomads, the research develops a process model to understand how these employees and their organizations negotiate the boundaries between traditional corporate structures and the flexibility of digital nomadism.

Problem Highly skilled knowledge workers increasingly desire the flexibility of a nomadic lifestyle, a concept traditionally seen as incompatible with permanent corporate employment. This creates a tension for organizations that need to attract and retain top talent but are built on location-dependent work models, leading to a professional paradox for employees wanting both stability and freedom.

Outcome - The study develops a three-phase process model (splintering, calibrating, and harmonizing) that explains how corporate nomads and their organizations successfully negotiate this new work arrangement.
- The integration of corporate nomads is not a one-sided decision but a mutual process of 'boundary work' requiring engagement, negotiation, and trade-offs from both the employee and the company.
- Corporate nomads operate as individual outliers who change their personal work boundaries (e.g., location and time) without transforming the entire organization's structure.
- Information Technology (IT) is crucial in managing the inherent tensions of this lifestyle, helping to balance organizational control with employee autonomy and enabling integration from a distance.
Corporate Nomads, Digital Nomads, Boundary Work, Digital Work, Information Systems
Capturing the “Social” in Social Networks: The Conceptualization and Empirical Application of Relational Quality

Capturing the “Social” in Social Networks: The Conceptualization and Empirical Application of Relational Quality

Christian Meske, Iris Junglas, Matthias Trier, Johannes Schneider, Roope Jaakonmäki, Jan vom Brocke
This study introduces and validates a concept called "relational quality" to better understand the social dynamics within online networks beyond just connection counts. By analyzing over 440,000 messages from two large corporate social networks, the researchers developed four measurable markers—being personal, curious, respectful, and sharing—to capture the richness of online relationships.

Problem Traditional analysis of social networks focuses heavily on structural aspects, such as who is connected to whom, but often overlooks the actual quality and nature of the interactions. This creates a research gap where the 'social' element of social networks is not fully understood, limiting our ability to see how online relationships create value. This study addresses this by developing a framework to conceptualize and measure the quality of these digital social interactions.

Outcome - Relational quality is a distinct and relevant dimension that complements traditional structural social network analysis (SNA), which typically only focuses on network structure.
- The study identifies and measures four key facets of relational quality: being personal, being curious, being polite, and sharing.
- Different types of users exhibit distinct patterns of relational quality; for instance, 'connectors' (users with many connections but low activity) are the most personal, while 'broadcasters' (users with high activity but few connections) share the most resources.
- As a user's activity (e.g., number of posts) increases, their interactions tend to become less personal, curious, and polite, while their sharing of resources increases.
- In contrast, as a user's number of connections grows, their interactions become more personal and curious, but they tend to share fewer resources.
Enterprise Social Network, Social Capital, Relational Quality, Social Network Analysis, Linguistic Analysis, Computational Research
What Goals Drive Employees' Information Systems Security Behaviors? A Mixed Methods Study of Employees' Goals in the Workplace

What Goals Drive Employees' Information Systems Security Behaviors? A Mixed Methods Study of Employees' Goals in the Workplace

Sebastian Schuetz, Heiko Gewald, Allen Johnston, Jason Bennett Thatcher
This study investigates the work-related goals that motivate employees' information systems security behaviors. It employs a mixed-methods approach, first using qualitative interviews to identify key employee goals and then using a large-scale quantitative survey to evaluate their importance in predicting security actions.

Problem Prior research on information security behavior often relies on general theories from criminology or public health, which do not fully capture the specific goals employees have in a workplace context. This creates a gap in understanding the primary motivations for why employees choose to follow or ignore security protocols during their daily work.

Outcome - Employees' security behaviors are primarily driven by the goals of achieving good work performance and avoiding blame for security incidents.
- Career advancement acts as a higher-order goal, giving purpose to security behaviors by motivating the pursuit of subgoals like work performance and blame avoidance.
- The belief that security behaviors help meet a supervisor's performance expectations (work performance alignment) is the single most important predictor of those behaviors.
- Organizational citizenship (the desire to be a 'good employee') was not a significant predictor of security behavior when other goals were considered.
- A strong security culture encourages secure behaviors by strengthening the link between these behaviors and the goals of work performance and blame avoidance.
Security Behaviors, Goal Systems Theory (GST), Work Performance, Blame Avoidance, Organizational Citizenship, Career Advancement
Technocognitive Structuration: Modeling the Role of Cognitive Structures in Technology Adaptation

Technocognitive Structuration: Modeling the Role of Cognitive Structures in Technology Adaptation

Rob Gleasure, Kieran Conboy, Qiqi Jiang
This study investigates how individuals' thought processes change when they adapt to using technology. The researchers propose and test a theory called 'technocognitive structuration', which posits that these mental changes (cognitive adaptations) are a crucial middle step that links changes in technology use to changes in task performance. The theory was tested through an online experiment where participants had to adapt their use of word processing software for a specific task.

Problem Existing theories often explain how people adapt to technology by focusing on social and behavioral factors, but they largely ignore how these adaptations change our internal mental models. This is a significant gap in understanding, as modern digital tools like AI, social media, and wearables are known to influence how we process information and conceptualize problems. The study addresses this by creating a model that explicitly includes these cognitive changes to provide a more complete picture of technology adaptation.

Outcome - The study's results confirmed that cognitive adaptation is a critical mediator between technology adaptation and task adaptation. In other words, changing how one thinks about a technology is a key step in translating new feature use into new ways of performing tasks.
- Two types of cognitive changes were identified: exploitative adaptations (refining existing mental models) and exploratory adaptations (creating fundamentally new mental models), both of which were found to be significant.
- These findings challenge existing research by suggesting that cognitive adaptation is not just a side effect but an essential mechanism to consider when explaining how and why people change their work practices in response to new technology.
Technocognitive Structuration, Technology Adaptation, Cognitive Structures, Adaptive Structuration Theory for Individuals, Structuration, Experiment
Making Sense of Discursive Formations and Program Shifts in Large-Scale Digital Infrastructures

Making Sense of Discursive Formations and Program Shifts in Large-Scale Digital Infrastructures

Egil Øvrelid, Bendik Bygstad, Ole Hanseth
This study examines how public and professional discussions, known as discourses, shape major changes in large-scale digital systems like national e-health infrastructures. Using an 18-year in-depth case study of Norway's e-health development, the research analyzes how high-level strategic trends interact with on-the-ground practical challenges to drive fundamental shifts in technology programs.

Problem Implementing complex digital infrastructures like national e-health systems is notoriously difficult, and leaders often struggle to understand why some initiatives succeed while others fail. Previous research focused heavily on the role of powerful individuals or groups, paying less attention to the underlying, systemic influence of how different conversations about technology and strategy converge over time. This gap makes it difficult for policymakers to make sensible, long-term decisions and navigate the evolution of these critical systems.

Outcome - Major shifts in large digital infrastructure programs occur when high-level strategic discussions (macrodiscourses) and practical, operational-level discussions (microdiscourses) align and converge.
- This convergence happens through three distinct processes: 'connection' (a shared recognition of a problem), 'matching' (evaluating potential solutions that fit both high-level goals and practical needs), and 'merging' (making a decision and reconciling the different perspectives).
- The result of this convergence is a new "discursive formation"—a powerful, shared understanding that aligns stakeholders, technology, and strategy, effectively launching a new program and direction.
- Policymakers and managers can use this framework to better analyze the alignment between broad technological trends and their organization's specific, internal needs, leading to more informed and realistic strategic planning.
Discursive Formations, Discourse Convergence, Large-Scale Digital Infrastructures, E-Health Programs, Program Shifts, Sociotechnical Systems, IT Strategy
Digital Infrastructure Development Through Digital Infrastructuring Work: An Institutional Work Perspective

Digital Infrastructure Development Through Digital Infrastructuring Work: An Institutional Work Perspective

Adrian Yeow, Wee-Kiat Lim, Samer Faraj
This paper investigates the complexities of developing large-scale digital infrastructure through a case study of an electronic medical record (EMR) system implementation in a U.S. hospital. It introduces and analyzes the concept of 'digital infrastructuring work'—the combination of technical, social, and symbolic actions that organizational actors perform. The study provides a framework for understanding the tensions and actions that shape the outcomes of such projects.

Problem Implementing new digital infrastructures in large organizations is challenging because it often disrupts established routines and power structures, leading to resistance and project stalls. Existing research frequently overlooks how the combination of technical tasks, social negotiations, and symbolic arguments by different groups influences the success or failure of these projects. This study addresses this gap by providing a more holistic view of the work involved in digital infrastructure development from an institutional perspective.

Outcome - The study introduces 'digital infrastructuring work' to explain how actors shape digital infrastructure development, categorizing it into three forms: digital object work (technical tasks), DI relational work (social interactions), and DI symbolic work (discursive actions).
- It finds that project stakeholders strategically combine these forms of work to either support change or maintain existing systems, highlighting the contested nature of infrastructure projects.
- The success or failure of a digital infrastructure project is shown to depend on how effectively different groups navigate the tensions between change and stability by skillfully blending technical, relational, and symbolic efforts.
- The paper demonstrates that technical work itself carries institutional significance and is not merely a neutral backdrop for social interactions, but a key site of contestation.
Digital Infrastructure Development, Institutional Work, IT Infrastructure Management, Healthcare Information Systems, Digital Objects, Case Study
Unpacking Board-Level IT Competency

Unpacking Board-Level IT Competency

Jennifer Jewer, Kenneth N. McKay
This study investigates how to best measure IT competency on corporate boards of directors. Using a survey of 75 directors in Sri Lanka, the research compares the effectiveness of indirect 'proxy' measures (like prior work experience) against 'direct' measures (assessing specific IT knowledge and governance practices) in reflecting true board IT competency and its impact on IT governance.

Problem Many companies struggle with poor IT governance, which is often blamed on a lack of IT competency at the board level. However, there is no clear consensus on what constitutes board IT competency or how to measure it effectively. Previous research has relied on various proxy measures, leading to inconsistent findings and uncertainty about how boards can genuinely improve their IT oversight.

Outcome - Direct measures of IT competency are more accurate and reliable indicators than indirect proxy measures.
- Boards with higher directly-measured IT competency demonstrate stronger IT governance.
- Among proxy measures, having directors with work experience in IT roles or management is more strongly associated with good IT governance than having directors with formal IT training.
- The study validates a direct measurement approach that boards can use to assess their competency gaps and take targeted steps to improve their IT governance capabilities.
Board of Directors, Board IT Competency, IT Governance, Proxy Measures, Direct Measures, Corporate Governance
Conceptual Data Modeling Use: A Study of Practitioners

Conceptual Data Modeling Use: A Study of Practitioners

Abhishek Sharma, Nenad Jukić, Dinko Bačić, Sippo Rossi, Svetlozar Nestorov
This study investigates the real-world adoption of conceptual data modeling among database professionals. Through a survey of 485 practitioners and 34 follow-up interviews, the research explores how frequently modeling is used, the reasons for its non-use, and its effect on project satisfaction.

Problem Conceptual data modeling is widely taught in academia as a critical step for successful database development, yet there is a lack of empirical research on its actual use in practice. This study addresses the gap between academic theory and industry practice by examining the extent of adoption and the barriers practitioners face.

Outcome - Only a minority of practitioners consistently create formal conceptual data models; fewer than 40% use them 'always' or 'mostly' during database development.
- The primary reasons for not using conceptual modeling include practical constraints such as informal whiteboarding practices (45.1%), lack of time (42.1%), and insufficient requirements (33.0%), rather than a rejection of the methodology itself.
- There is a significant positive correlation between the frequency of using conceptual data modeling and practitioners' satisfaction with the database development outcome.
Conceptual Data Modeling, Entity Relationship Modeling, Relational Database, Database Design, Database Implementation, Practitioner Study
Understanding the Ethics of Generative AI: Established and New Ethical Principles

Understanding the Ethics of Generative AI: Established and New Ethical Principles

Joakim Laine, Matti Minkkinen, Matti Mäntymäki
This study conducts a comprehensive review of academic literature to synthesize the ethical principles of generative artificial intelligence (GenAI) and large language models (LLMs). It explores how established AI ethics are presented in the context of GenAI and identifies what new ethical principles have surfaced due to the unique capabilities of this technology.

Problem The rapid development and widespread adoption of powerful GenAI tools like ChatGPT have introduced new ethical challenges that are not fully covered by existing AI ethics frameworks. This creates a critical gap, as the specific ethical principles required for the responsible development and deployment of GenAI systems remain relatively unclear.

Outcome - Established AI ethics principles (e.g., fairness, privacy, responsibility) are still relevant, but their importance and interpretation are shifting in the context of GenAI.
- Six new ethical principles specific to GenAI are identified: respect for intellectual property, truthfulness, robustness, recognition of malicious uses, sociocultural responsibility, and human-centric design.
- Principles such as non-maleficence, privacy, and environmental sustainability have gained heightened importance due to the general-purpose, large-scale nature of GenAI systems.
- The paper proposes 'meta-principles' for managing ethical complexities, including ranking principles, mapping contradictions between them, and implementing continuous monitoring.
Generative AI, AI Ethics, Large Language Models, AI Governance, Ethical Principles, AI Auditing
Evolving Rural Life through Digital Transformation in Micro-Organisations

Evolving Rural Life through Digital Transformation in Micro-Organisations

Johanna Lindberg, Mari Runardotter, Anna Ståhlbröst
This study investigates how low-tech digital solutions can improve living conditions and services in rural communities. Through a participatory action research approach in northern Sweden, the DigiBy project implemented and adapted various digital services, such as digital locks and information venues, in micro-organizations like retail stores and village associations.

Problem Rural areas often face significant challenges, including sparse populations and a significant service gap compared to urban centers, leading to digital polarization. This study addresses how this divide affects the quality of life and hinders the development of rural societies, whose distinct needs are often overlooked by mainstream technological advancements.

Outcome - Low-cost, robust, and user-friendly digital solutions can significantly reduce the service gap between rural villages and municipal centers, noticeably improving residents' quality of life.
- Empowering residents through collaborative implementation of tailored digital solutions enhances their digital skills and knowledge about technology.
- The introduction of digital services fosters hope, optimism, and a sense of belonging among rural residents, mitigating crises related to service disparities.
- The study concludes that the primary driver for adopting these technologies in villages is the promise of technical acceleration to meet local needs, which in turn drives positive social change.
Digital Transformation, Rural Societies, Digital Retail Service, Adaptation, Action Research
The Impact of Gamification on Cybersecurity Learning: Multi-Study Analysis

The Impact of Gamification on Cybersecurity Learning: Multi-Study Analysis

J.B. (Joo Baek) Kim, Chen Zhong, Hong Liu
This paper systematically assesses the impact of gamification on cybersecurity education through a four-semester, multi-study approach. The research compares learning outcomes between gamified and traditional labs, analyzes student perceptions and motivations using quantitative methods, and explores learning experiences through qualitative interviews. The goal is to provide practical strategies for integrating gamification into cybersecurity courses.

Problem There is a critical and expanding cybersecurity workforce gap, emphasizing the need for more effective, practical, and engaging training methods. Traditional educational approaches often struggle to motivate students and provide the necessary hands-on, problem-solving skills required for the complex and dynamic field of cybersecurity.

Outcome - Gamified cybersecurity labs led to significantly better student learning outcomes compared to traditional, non-gamified labs.
- Well-designed game elements, such as appropriate challenges and competitiveness, positively influence student motivation. Intrinsic motivation (driven by challenge) was found to enhance learning outcomes, while extrinsic motivation (driven by competition) increased career interest.
- Students found gamified labs more engaging due to features like instant feedback, leaderboards, clear step-by-step instructions, and story-driven scenarios that connect learning to real-world applications.
- Gamification helps bridge the gap between theoretical knowledge and practical skills, fostering deeper learning, critical thinking, and a greater interest in pursuing cybersecurity careers.
Gamification, Cybersecurity Learning, Student Motivation, Learning Outcomes, Mixed-method Design, PLS-SEM
Control Balancing in Offshore Information Systems Development: Extended Process Model

Control Balancing in Offshore Information Systems Development: Extended Process Model

Zafor Ahmed, Evren Eryilmaz, Vinod Kumar, Uma Kumar
This study investigates how project controls are managed and adjusted over time in offshore information systems development (ISD) projects. Using a case-based, grounded theory methodology, the researchers analyzed four large-scale offshore ISD projects to understand the dynamics of 'control balancing'. The research extends existing theories by explaining how control configurations shift between client and vendor teams throughout a project's lifecycle.

Problem Managing offshore information systems projects is complex due to geographic, cultural, and organizational differences that complicate coordination and oversight. Existing research has not fully explained how different control mechanisms should be dynamically balanced to manage evolving relationships and ensure stakeholder alignment. This study addresses the gap in understanding the dynamic process of adjusting controls in response to changing project circumstances and levels of shared understanding between clients and vendors.

Outcome - Proposes an extended process model for control balancing that illustrates how control configurations shift dynamically throughout an offshore ISD project.
- Identifies four distinct control orientations (strategic, responsibility, harmony, and persuasion) that explain the motivation behind control shifts at different project phases.
- Introduces a new trigger factor for control shifts called 'negative anticipation,' which is based on the project manager's perception rather than just performance outcomes.
- Finds that control configurations transition between authoritative, coordinated, and trust-based styles, and that these shifts are directly related to the level of shared understanding between the client and vendor.
- Discovers a new control transition path where projects can shift directly from a trust-based to an authoritative control style, often to repair or reassess a deteriorating relationship.
Control Balancing, Control Dynamics, Offshore ISD, IS Implementation, Control Theory, Grounded Theory Method
The State of Globalization of the Information Systems Discipline: A Historical Analysis

The State of Globalization of the Information Systems Discipline: A Historical Analysis

Tobias Mettler
This study explores the degree of globalization within the Information Systems (IS) academic discipline by analyzing research collaboration patterns over four decades. Using historical and geospatial network analysis of bibliometric data from 1979 to 2021, the research assesses the geographical evolution of collaborations within the field. The study replicates and extends a previous analysis from 2003 to determine if the IS community has become more globalized or has remained localized.

Problem Global challenges require global scientific collaboration, yet there is a growing political trend towards localization and national focus, creating a tension for academic fields like Information Systems. There has been limited systematic research on the geographical patterns of collaboration in IS for the past two decades. This study addresses this gap by investigating whether the IS discipline has evolved into a more international community or has maintained a localized, parochial character in the face of de-globalization trends and geopolitical shifts.

Outcome - The Information Systems (IS) discipline has become significantly more international since 2003, transitioning from a localized 'germinal phase' to one with broader global participation.
- International collaboration has steadily increased, with internationally co-authored papers rising from 7.9% in 1979-1983 to 47.5% in 2010-2021.
- Despite this growth, the trend toward global (inter-continental) collaboration has been slower and appears to have plateaued around 2015.
- Research activity remains concentrated in economically affluent nations, with regions like South America, Africa, and parts of Asia still underrepresented in the global academic discourse.
- The discipline is now less 'parochial' but cannot yet be considered a truly 'global research discipline' due to these persistent geographical imbalances.
Globalization of Research, Information Systems Discipline, Historical Analysis, De-globalization, Localization of Research, Research Collaboration, Bibliometrics
Conceptualizing IT Artefacts for Policymaking – How IT Artefacts Evolve as Policy Objects

Conceptualizing IT Artefacts for Policymaking – How IT Artefacts Evolve as Policy Objects

Karin Väyrynen, Sari Laari-Salmela, Netta Iivari, Arto Lanamäki, Marianne Kinnula
This study explores how an information technology (IT) artefact evolves into a 'policy object' during the policymaking process, using a 4.5-year longitudinal case study of the Finnish Taximeter Law. The research proposes a conceptual framework that identifies three forms of the artefact as it moves through the policy cycle: a mental construct, a policy text, and a material IT artefact. This framework helps to understand the dynamics and challenges of regulating technology.

Problem While policymaking related to information technology is increasingly significant, the challenges stemming from the complex, multifaceted nature of IT are poorly understood. There is a specific gap in understanding how real-world IT artefacts are translated into abstract policy texts and how those texts are subsequently reinterpreted back into actionable technologies. This 'translation' process often leads to ambiguity and unintended consequences during implementation.

Outcome - Proposes a novel conceptual framework for understanding the evolution of an IT artefact as a policy object during a public policy cycle.
- Identifies three distinct forms the IT artefact takes: 1) a mental construct in the minds of policymakers and stakeholders, 2) a policy text such as a law, and 3) a material IT artefact as a real-world technology that aligns with the policy.
- Highlights the significant challenges in translating complex real-world technologies into abstract legal text and back again, which can create ambiguity and implementation difficulties.
- Distinguishes between IT artefacts at the policy level and IT artefacts as real-world technologies, showing how they evolve on separate but interconnected tracks.
IT Artefact, IT Regulation, Law, Policy Object, Policy Cycle, Public Policymaking, European Al Act
Digital Sustainability Trade-Offs: Public Perceptions of Mobile Radiation and Green Roofs

Digital Sustainability Trade-Offs: Public Perceptions of Mobile Radiation and Green Roofs

Laura Recuero Virto, Peter Saba, Arno Thielens, Marek Czerwiński, Paul Noumba Um
This study investigates public opinion on the trade-offs between digital technology and environmental sustainability, specifically focusing on the effects of mobile radiation on green roofs. Using a survey and a Discrete Choice Experiment with an urban French population, the research assesses public willingness to fund research into the health impacts on both humans and plants.

Problem As cities adopt sustainable solutions like green roofs, they are also expanding digital infrastructure such as 5G mobile antennas, which are often placed on rooftops. This creates a potential conflict where the ecological benefits of green roofs are compromised by mobile radiation, but the public's perception and valuation of this trade-off between technology and environment are not well understood.

Outcome - The public shows a significant preference for funding research on the human health impacts of mobile radiation, with a willingness to pay nearly twice as much compared to research on plant health.
- Despite the lower priority, there is still considerable public support for researching the effects of radiation on plant health, indicating a desire to address both human and environmental concerns.
- When assessing risks, people's decisions are primarily driven by cognitive, rational analysis rather than by emotional or moral concerns.
- The public shows no strong preference for non-invasive research methods (like computer simulations) over traditional laboratory and field experiments.
- As the cost of funding research initiatives increases, the public's willingness to pay for them decreases.
Digital Sustainability, Green Roofs, Mobile Radiation, Risk Perception, Public Health, Willingness to Pay, Environmental Policy
Exploring Concerns of Fake News on ChatGPT: A Network Analysis of Social Media Conversations

Exploring Concerns of Fake News on ChatGPT: A Network Analysis of Social Media Conversations

Pramukh N. Vasist, Satish Krishnan, Thompson Teo, Nasreen Azad
This study investigates public concerns regarding ChatGPT's potential to generate and spread fake news. Using social network analysis and text analysis, the authors examined social media conversations on Twitter over 22 weeks to identify key themes, influential users, and overall sentiment surrounding the issue.

Problem The rapid emergence and adoption of powerful generative AI tools like ChatGPT have raised significant concerns about their potential misuse for creating and disseminating large-scale misinformation. This study addresses the need to understand early user perceptions and the nature of online discourse about this threat, which can influence public opinion and the technology's development.

Outcome - A social network analysis identified an engaged community of users, including AI experts, journalists, and business leaders, actively discussing the risks of ChatGPT generating fake news, particularly in politics, healthcare, and journalism.
- Sentiment analysis of the conversations revealed a predominantly negative outlook, with nearly 60% of the sentiment expressing apprehension about ChatGPT's potential to create false information.
- Key actors functioning as influencers and gatekeepers were identified, shaping the narrative around the tool's tendency to produce biased or fabricated content.
- A follow-up analysis nearly two years after ChatGPT's launch showed a slight decrease in negative sentiment, but user concerns remained persistent and comparable to those for other AI tools like Gemini and Copilot, highlighting the need for stricter regulation.
ChatGPT, Disinformation, Fake News, Generative Al, Social Network Analysis, Misinformation
Load More Showing 18 of 237