AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & IoT SME & IT Management Platform Ecosystems & Strategy Cybersecurity & Risk AI Applications & Technologies Healthcare & Well-being Digital Work & Collaboration
Procuring Accessible Third-Party Web-Based Software Applications for Inclusivity: A Socio-technical Approach

Procuring Accessible Third-Party Web-Based Software Applications for Inclusivity: A Socio-technical Approach

Niamh Daly, Ciara Heavin, James Northridge
This study investigates how universities can improve their decision-making processes when procuring third-party web-based software to enhance accessibility for students and staff. Using a socio-technical systems framework, the research conducts a case study at a single university, employing qualitative interviews with procurement experts and users to evaluate current practices.

Problem The procurement process for web-based software in higher education often fails to adequately consider web accessibility standards. This oversight creates barriers for an increasingly diverse student population, including those with disabilities, and represents a failure to integrate equality, diversity, and inclusion into critical technology-related decisions.

Outcome - Procurement processes often lack standardized, early-stage accessibility testing, with some evaluations occurring after the software has already been acquired.
- A significant misalignment exists between the accessibility testing practices of software vendors and the actual needs of the higher education institution.
- Individuals with disabilities are not typically involved in the initial evaluation phase, though their feedback might be sought after implementation, leading to reactive rather than proactive solutions.
- Accessible software directly improves student engagement and fosters a more inclusive campus environment, benefiting the entire university community.
- The research proposes using the SEIPS 2.0 model as a structured framework to map the procurement work system, improve accessibility evaluation, and better integrate diverse expertise into the decision-making process.
Web Accessibility (WA), Procurement, Web-Based Software, Socio-Technical Systems, Higher Education Institutions (HEIs)
Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port

Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port

Shantanu Dey, Rajhans Mishra, Sayantan Mukherjee
This study investigates how next-generation connectivity, specifically 5G technology, can enhance both the resilience and sustainability of supply chains operating within smart ports. The researchers developed a comprehensive framework by systematically reviewing over 1,000 academic papers and conducting a detailed case study on a major smart port.

Problem Global supply chains face constant threats from disruptions, ranging from pandemics to geopolitical events. There is a critical need to understand how modern technologies can help these supply chains not only recover from shocks (resilience) but also operate in an environmentally and socially responsible manner (sustainability), particularly at vital hubs like ports.

Outcome - Next-generation connectivity like 5G can shape the interplay between resilience and sustainability at multiple levels, including facilities, supply chain ecosystems, and society.
- 5G acts as an integrated data and technology platform that helps policymakers and practitioners justify investments in sustainability measures.
- The technology is critical for supporting ecological resilience and community-centric initiatives, such as infrastructure development, asset maintenance, and stakeholder safety.
- Ultimately, advanced connectivity drives a convergence where building resilience and achieving sustainability become mutually reinforcing goals.
Ecological Resilience, Next Generation Connectivity, Sustainability Resilience Interdependence, Smart Ports, Private 5G, Supply Chain Resilience
Exploring the Role of Third Parties in Digital Transformation Initiatives: A Problematized Assumptions Perspective

Exploring the Role of Third Parties in Digital Transformation Initiatives: A Problematized Assumptions Perspective

Jack O'Neill, David Pidoyma, Ciara Northridge, Shivani Pai, Stephen Treacy, and Andrew Brosnan
This study investigates the role and influence of external partners in corporate digital transformation projects. Using a 'problematized assumptions' approach, the research challenges the common view that transformation is a purely internal affair by analyzing existing literature and conducting 26 semi-structured interviews with both client organizations and third-party service providers.

Problem Much of the existing research on digital transformation describes it as an initiative orchestrated primarily within an organization, which overlooks the significant and growing market for third-party consultants and services. This gap in understanding leads to problematic assumptions about how transformations are managed, creating risks and missed opportunities for businesses that increasingly rely on external expertise.

Outcome - A fully outsourced digital transformation is infeasible, as core functions like culture and change management must be led internally.
- Third parties play a critical role, far greater than literature suggests, by providing specialized expertise for strategy development and technical execution.
- The most effective approach is a bimodal model, where the organization owns the high-level vision and mission, while collaborating with third parties on strategy and tactics.
- Digital transformation should be viewed as a continuous process of socio-technical change and evolution, not a project with a defined endpoint.
- Success is more practically measured by optimizing operational components (Vision, Mission, Objectives, Strategy, Tactics - VMOST) rather than solely focusing on a reconceptualization of value.
Digital Transformation, Third Parties, Managed Services, Problematization, Outsourcing, IT Strategy, Socio-technical Change
Unveiling Enablers to the Use of Generative AI Artefacts in Rural Educational Settings: A Socio-Technical Perspective

Unveiling Enablers to the Use of Generative AI Artefacts in Rural Educational Settings: A Socio-Technical Perspective

Pramod K. Patnaik, Kunal Rao, Gaurav Dixit
This study investigates the factors that enable the use of Generative AI (GenAI) tools in rural educational settings within developing countries. Using a mixed-method approach that combines in-depth interviews and the Grey DEMATEL decision-making method, the research identifies and analyzes these enablers through a socio-technical lens to understand their causal relationships.

Problem Marginalized rural communities in developing countries face significant challenges in education, including a persistent digital divide that limits access to modern learning tools. This research addresses the gap in understanding how Generative AI can be practically leveraged to overcome these education-related challenges and improve learning quality in under-resourced regions.

Outcome - The study identified fifteen key enablers for using Generative AI in rural education, grouped into social and technical categories.
- 'Policy initiatives at the government level' was found to be the most critical enabler, directly influencing other key factors like GenAI training for teachers and students, community awareness, and school leadership commitment.
- Six novel enablers were uncovered through interviews, including affordable internet data, affordable telecommunication networks, and the provision of subsidized devices for lower-income groups.
- An empirical framework was developed to illustrate the causal relationships among the enablers, helping stakeholders prioritize interventions for effective GenAI adoption.
Generative AI, Rural, Education, Digital Divide, Interviews, Socio-technical Theory
Understanding the Implementation of Responsible Artificial Intelligence in Organizations: A Neo-Institutional Theory Perspective

Understanding the Implementation of Responsible Artificial Intelligence in Organizations: A Neo-Institutional Theory Perspective

David Horneber
This study conducts a literature review to understand why organizations struggle to effectively implement Responsible Artificial Intelligence (AI). Using a neo-institutional theory framework, the paper analyzes institutional pressures, common challenges, and the roles that AI practitioners play in either promoting or hindering the adoption of responsible AI practices.

Problem Despite growing awareness of AI's ethical and social risks and the availability of responsible AI frameworks, many organizations fail to translate these principles into practice. This gap between stated policy and actual implementation means that the goals of making AI safe and ethical are often not met, creating significant risks for businesses and society while undermining trust.

Outcome - A fundamental tension exists between the pressures to adopt Responsible AI (e.g., legal compliance, reputation) and inhibitors (e.g., market demand for functional AI, lack of accountability), leading to ineffective, symbolic implementation.
- Ineffectiveness often takes two forms: 'policy-practice decoupling' (policies are adopted for show but not implemented) and 'means-end decoupling' (practices are implemented but fail to achieve their intended ethical goals).
- AI practitioners play crucial roles as either 'institutional custodians' who resist change to preserve existing technical practices, or as 'institutional entrepreneurs' who champion the implementation of Responsible AI.
- The study concludes that a bottom-up approach by motivated practitioners is insufficient; effective implementation requires strong organizational support, clear structures, and proactive processes to bridge the gap between policy and successful outcomes.
Artificial Intelligence, Responsible AI, AI Ethics, Organizations, Neo-Institutional Theory
Designing Sustainable Business Models with Emerging Technologies: Navigating the Ontological Reversal and Network Effects to Balance Externalities

Designing Sustainable Business Models with Emerging Technologies: Navigating the Ontological Reversal and Network Effects to Balance Externalities

Rubén Mancha, Ainara Novales
This study investigates how companies can use emerging technologies like AI, IoT, and blockchain to build sustainable business models. Through a literature review and analysis of industry cases, the research develops a theoretical model that explains how digital phenomena, specifically network effects and ontological reversal, can be harnessed to generate positive environmental impact.

Problem Organizations face urgent pressure to address environmental challenges like climate change, but there is a lack of clear frameworks on how to strategically design business models using new digital technologies for sustainability. This study addresses the gap in understanding how to leverage core digital concepts—network effects and the ability of digital tech to shape physical reality—to create scalable environmental value, rather than just optimizing existing processes.

Outcome - The study identifies three key network effect mechanisms that drive environmental value: participation effects (value increases as more users join), data-mediated effects (aggregated user data enables optimizations), and learning-moderated effects (AI-driven insights continuously improve the network).
- It highlights three ways emerging technologies amplify these effects by shaping the physical world (ontological reversal): data infusion (embedding real-time analytics into physical processes), virtualization (using digital representations to replace physical prototypes), and dematerialization (replacing physical items with digital alternatives).
- The interaction between these network effects and ontological reversal creates reinforcing feedback loops, allowing digital platforms to not just represent, but actively shape and improve sustainable physical realities at scale.
Digital Sustainability, Green Information Systems, Ontological Reversal, Network Effects, Digital Platforms, Ecosystems
Enhancing Healthcare with Artificial Intelligence: A Configurational Integration of Complementary Technologies and Stakeholder Needs

Enhancing Healthcare with Artificial Intelligence: A Configurational Integration of Complementary Technologies and Stakeholder Needs

Digvijay S. Bizalwan, Rahul Kumar, Ajay Kumar, Yeming Yale Gong
This study analyzes over 11,000 research articles to understand how to best implement Artificial Intelligence (AI) in healthcare. Using topic modeling and qualitative comparative analysis, it identifies the essential complementary technologies and strategic combinations required for successful AI adoption from a multi-stakeholder perspective.

Problem Healthcare organizations recognize the potential of AI but often lack a clear roadmap for its successful implementation. There is a research gap in identifying which complementary technologies are needed to support AI and how these technologies must be combined to create value while satisfying the diverse needs of various stakeholders, such as patients, physicians, and administrators.

Outcome - Three key technologies are crucial complements to AI in healthcare: Healthcare Digitalization (DIG), Healthcare Information Management (HIM), and Medical Artificial Intelligence (MAI).
- Simply implementing these technologies in isolation is insufficient; their synergistic integration is vital for success.
- The study confirms that the combination of DIG, HIM, and MAI is the most effective configuration to satisfy the interests of multiple stakeholders, leading to better healthcare service delivery.
AI, Healthcare, Digitalization, Information Management, Configurational Theory, Stakeholder Interests, fsQCA
Mehr als Vollzeit: Fractional CIOs in KMUs

Mehr als Vollzeit: Fractional CIOs in KMUs

Simon Kratzer, Markus Westner, Susanne Strahringer
This study investigates the emerging role of 'Fractional CIOs,' who provide part-time IT leadership to small and medium-sized enterprises (SMEs). It synthesizes findings from a research project involving 62 Fractional CIOs across 10 countries and contextualizes them for the German market through interviews with three local Fractional CIOs/CTOs. The research aims to define the role, identify different types of engagements, and uncover key success factors.

Problem Small and medium-sized enterprises (SMEs) increasingly require sophisticated IT management to remain competitive, yet often lack the resources or need to hire a full-time Chief Information Officer (CIO). This gap leaves them vulnerable, as IT responsibilities are often handled by non-experts, leading to potential productivity losses and security risks. The study addresses this challenge by exploring a flexible and cost-effective solution.

Outcome - The study defines the 'Fractional CIO' role as a flexible, part-time IT leadership solution for SMEs, combining the benefits of an internal executive with the flexibility of an external consultant.
- Four distinct engagement types are identified for Fractional CIOs: Strategic IT Management, Restructuring, Rapid Scaling, and Hands-on Support, each tailored to different business needs.
- The most critical success factors for a successful engagement are trust between the company and the Fractional CIO, strong support from the top management team, and the CIO's personal integrity.
- While the Fractional CIO model is not yet widespread in Germany, the study concludes it offers significant potential value for German SMEs seeking expert IT leadership without the cost of a full-time hire.
- Three profiles of Fractional CIOs were identified based on their engagement styles: Strategic IT-Coaches, Full-Ownership-CIOs, and Change Agents.
Fractional CIO, Fractional CTO, Part-Time Interim Management, SMEs, IT Management, Chief Information Officer
How Dr. Oetker's Digital Platform Strategy Evolved to Include Cross-Platform Orchestration

How Dr. Oetker's Digital Platform Strategy Evolved to Include Cross-Platform Orchestration

Patrick Rövekamp, Philipp Ollig, Hans Ulrich Buhl, Robert Keller, Albert Christmann, Pascal Remmert, and Tobias Thamm
This study analyzes the evolution of the digital platform strategy at Dr. Oetker, a traditional consumer goods company. It examines how the firm developed its approach from competing for platform ownership to collaborating and orchestrating a complex 'baking ecosystem' across multiple platforms. The paper provides actionable recommendations for other traditional firms navigating digital transformation.

Problem Traditional incumbent firms, built on linear supply chains and supply-side economies of scale, are increasingly challenged by the rise of digital platforms that leverage network effects. These firms often lack the necessary capabilities and strategies to effectively compete or participate in digital ecosystems. This study addresses the need for a strategic framework that helps such companies develop and manage their digital platform activities.

Outcome - A successful digital platform strategy for a traditional firm requires two key elements: specific tactics for individual platforms (e.g., building, partnering, complementing) and a broader cross-platform orchestration to manage the interplay between platforms and the core business.
- Firms should evolve their strategy in phases, often moving from a competitive mindset of platform ownership to a more cooperative approach of complementing other platforms and building an ecosystem.
- It is crucial to establish a dedicated organizational unit (like Dr. Oetker's 'AllAboutCake GmbH') to coordinate digital initiatives, reduce complexity, and align platform activities with the company's overall business goals.
- Traditional firms must strategically decide whether to build their own digital resources or partner with others, recognizing that partnering can be more effective for entering niche markets or acquiring necessary technology without high upfront investment.
Digital Platform Strategy, Cross-Platform Orchestration, Incumbent Firms, Digital Transformation, Business Ecosystems, Case Study, Dr. Oetker
Alike but Apart: Tie Decay in Social Commerce

Alike but Apart: Tie Decay in Social Commerce

Bingqing Song, Yidi Liu, Xin Li
This study examines how a seller's promotional strategies on social platforms impact the strength of their relationships with customers. Using empirical data from a large Chinese social commerce website, the researchers analyzed seller-customer interactions to determine what promotional content keeps customers engaged versus what causes them to lose interest over time.

Problem In social commerce, the connections between sellers and potential customers are often fragile and easily broken, a problem known as 'tie decay.' For sellers, particularly smaller ones who rely heavily on social networks, maintaining these relationships is crucial for business success. However, there is a lack of understanding about which specific promotional activities strengthen these ties and prevent customers from disengaging.

Outcome - The relationship between how well promotions align with a customer's interests and the strength of their connection is an inverted U-shape; a moderate level of alignment is optimal for maintaining the relationship.
- Promoting products that are too similar to a customer's past interests can lead to boredom and weaken the tie, just as promoting completely irrelevant products can.
- The frequency of promotions moderates this effect; sellers who post more frequently can afford to have a higher alignment with customer interests without causing them to disengage.
- These findings are most significant for maintaining relationships with long-term, loyal customers, who are the most valuable to a seller's business.
Tie Decay, Social Commerce, Relationship Maintenance, Interest Alignment, Customer Engagement, Promotional Strategy
Configurational Recipes for IT-AMC Competitive Dynamics

Configurational Recipes for IT-AMC Competitive Dynamics

One-Ki Dainel Lee, YoungKi Park, Inmyung Choi, Arun Rai
This study investigates how a firm's information technology (IT) assets interact with its organizational awareness, motivation, and capability (AMC) to drive competitive actions. Using survey data from 189 manufacturing firms and fuzzy-set qualitative comparative analysis (fsQCA), the research identifies multiple effective combinations, or 'recipes,' of these factors that lead to frequent competitive moves under different business conditions.

Problem Traditional business research often oversimplifies IT's role, treating it as a standalone factor rather than exploring its complex interplay with organizational capabilities. This study addresses the gap in understanding how specific combinations of IT assets (like infrastructure and applications) and AMC factors synergistically produce competitive actions in varying market environments.

Outcome - The research identifies four distinct 'configurational recipes' for success: automation, autonomy, innovation, and integration, each suited for different contexts based on firm size and environmental uncertainty.
- A firm's awareness of the market and its operational excellence capability are core elements in all successful configurations for generating competitive actions.
- IT infrastructure is a necessary condition for large firms to be competitive, while market awareness is necessary for firms of all sizes.
- The study demonstrates that IT can both substitute for and complement AMC factors; for instance, in stable environments, IT can automate decision-making, substituting for managerial motivation and operational innovation.
Competitive Dynamics, IT Assets, AMC Framework, Configurational Analysis, fsQCA, Causal Recipes, Information Systems
Paid Search Marketing vs. Search Engine Optimization: Analytical Models of Search Marketing Based on Search Engine Quality

Paid Search Marketing vs. Search Engine Optimization: Analytical Models of Search Marketing Based on Search Engine Quality

Kai Li, Chunyang Shen, Mei Lin, Zhangxi Lin
This study uses an analytical model to examine the competitive relationship between paid search marketing (PSM), offered by search engines, and search engine optimization (SEO), offered by third-party firms. The research analyzes how a search engine's quality, in terms of effectiveness and robustness against manipulation, influences the strategic decisions of search engines, advertisers, and the survival of SEO companies. This analysis is conducted through a game theory framework to model the interactions among these market participants.

Problem Dominant search engines like Google seem to tolerate the existence of SEO firms, even though these firms compete for the same advertising revenue and can sometimes compromise the quality of search results. This raises a key question: why don't search engines use their market power to eliminate SEO companies? This study addresses this research gap by investigating the market dynamics and conditions that allow SEO firms to coexist and even thrive in a market dominated by search engines.

Outcome - A search engine can achieve higher profits by allowing SEO firms to operate rather than driving them out of the market.
- The competition from SEO firms creates a "constructive competition" that can push the search engine to improve its own algorithms and pricing, ultimately expanding the overall market.
- Improving a search engine's effectiveness does not always lead to higher profits; it can sometimes make SEO services more appealing to advertisers, which intensifies competition and can lower the search engine's revenue.
- There is not always a positive correlation between advertisers' willingness to pay for ads and the final click price; under certain competitive conditions, the price may decrease as willingness to pay increases.
Search Engine, Search Engine Advertising, Search Engine Optimization, Paid Search Marketing, Search Engine Quality, Game Theory
Work-Family Frustration When You and Your Partner Both Work From Home: The Role of ICT Permeability, Planning, and Gender

Work-Family Frustration When You and Your Partner Both Work From Home: The Role of ICT Permeability, Planning, and Gender

Manju Ahuja, Rui Sundrup, Massimo Magni
This study investigates the psychological and relational challenges for couples who both work from home. Using a 10-day diary-based approach, researchers examined how the use of work-related information and communication technology (ICT) during personal time blurs the boundaries between work and family, leading to after-work frustration.

Problem The widespread adoption of remote work, particularly for dual-income couples, has created new challenges in managing work-life balance. The constant connectivity enabled by technology allows work to intrude into family life, depleting mental resources and increasing frustration and relationship conflict, yet the dynamics of this issue, especially when both partners work from home, are not well understood.

Outcome - Using work technology during personal time (ICT permeability) is directly linked to higher levels of after-work frustration.
- This negative effect is significantly stronger for women, likely due to greater societal expectations regarding family roles.
- Proactively engaging in daily planning, such as setting priorities and scheduling tasks, effectively reduces the frustration caused by blurred work-family boundaries.
- Increased after-work frustration leads to a higher likelihood of conflict with one's partner.
- Counterintuitively, after-work frustration was also associated with a small increase in job productivity, suggesting individuals may immerse themselves in work as a coping mechanism.
Remote work, Work-Life Balance, ICT Permeability, Planning Behavior, Family Conflict, Gender Dynamics
Affordance-Based Pathway Model of Social Inclusion: A Case Study of Virtual Worlds and People With Lifelong Disability

Affordance-Based Pathway Model of Social Inclusion: A Case Study of Virtual Worlds and People With Lifelong Disability

Karen Stendal, Maung K. Sein, Devinder Thapa
This study explores how individuals with lifelong disabilities (PWLD) use virtual worlds, specifically Second Life, to achieve social inclusion. Using a qualitative approach with in-depth interviews and participant observation, the researchers analyzed how PWLD experience the platform's features. The goal was to develop a model explaining the process through which technology facilitates greater community participation and interpersonal connection for this marginalized group.

Problem People with lifelong disabilities often face significant social isolation and exclusion due to physical, mental, or sensory impairments that hinder their full participation in society. This lack of social connection can negatively impact their psychological and emotional well-being. This research addresses the gap in understanding the specific mechanisms by which technology, like virtual worlds, can help this population move from isolation to inclusion.

Outcome - Virtual worlds offer five key 'affordances' (action possibilities) that empower people with lifelong disabilities (PWLD).
- Three 'functional' affordances were identified: Communicability (interacting without barriers like hearing loss), Mobility (moving freely without physical limitations), and Personalizability (controlling one's digital appearance and whether to disclose a disability).
- These functional capabilities enable two 'social' affordances: Engageability (the ability to join in social activities) and Self-Actualizability (the ability to realize one's potential and help others).
- The study proposes an 'Affordance-Based Pathway Model' which shows how using these features helps PWLD build interpersonal relationships and participate in communities, leading to social inclusion.
Social Inclusion, Virtual Worlds (VW), People With Lifelong Disability (PWLD), Affordances, Second Life, Assistive Technology, Qualitative Study
Algorithmic Management Resource Model and Crowdworking Outcomes: A Mixed Methods Approach to Computational and Configurational Analysis

Algorithmic Management Resource Model and Crowdworking Outcomes: A Mixed Methods Approach to Computational and Configurational Analysis

Mohammad Soltani Delgosha, Nastaran Hajiheydari
This study investigates how management by algorithms on platforms like Uber and Lyft affects gig workers' well-being. Using a mixed-methods approach, the researchers first analyzed millions of online forum posts from crowdworkers to identify positive and negative aspects of algorithmic management. They then used survey data to examine how different combinations of these factors lead to worker engagement or burnout.

Problem As the gig economy grows, millions of workers are managed by automated algorithms instead of human bosses, leading to varied outcomes. While this is efficient for companies, its impact on workers is unclear, with some reporting high satisfaction and others experiencing significant stress and burnout. This study addresses the lack of understanding about why these experiences differ and which specific algorithmic practices support or harm worker well-being.

Outcome - Algorithmic management creates both resource gains for workers (e.g., work flexibility, performance feedback, rewards) and resource losses (e.g., unclear rules, unfair pay, constant monitoring).
- Perceived unfairness in compensation, punishment, or workload is the most significant driver of crowdworker burnout.
- The negative impacts of resource losses, like unfairness and poor communication, generally outweigh the positive impacts of resource gains, such as flexibility.
- Strong algorithmic support (providing clear information and fair rewards) is critical for fostering worker engagement and can help mitigate the stress of constant monitoring.
- Work flexibility alone is not enough to prevent burnout; workers also need to feel they are treated fairly and are adequately supported by the platform.
Algorithmic Management, Crowdworkers, Engagement, Burnout, Gig Economy, Online Labor Platforms, Resource Gains and Losses
Computer Self-Efficacy: A Meta-Analytic Review

Computer Self-Efficacy: A Meta-Analytic Review

Richard D. Johnson, Jennifer E. Pullin, Jason B. Thatcher, Philip L. Roth
This study conducts a large-scale meta-analysis to synthesize over 30 years of research on Computer Self-Efficacy (CSE), an individual's belief in their ability to use computers. By reviewing 683 papers across 749 independent samples, the researchers empirically assess the network of factors that influence and are influenced by CSE, proposing an updated model to reflect the contemporary technological environment.

Problem Previous comprehensive reviews of Computer Self-Efficacy are over two decades old and do not account for the significant evolution of information technology, from mainframes to ubiquitous personal and mobile devices. This has created a gap in understanding how CSE is formed, its key influencing factors, and its impact on performance in today's complex digital world, leading to a fragmented and outdated theoretical foundation.

Outcome - Computer experience (enactive mastery) and computer anxiety (emotional arousal) are confirmed as the strongest and most consistently researched predictors of an individual's computer self-efficacy (CSE).
- The review identified 18 additional variables significantly related to CSE that were not part of previous major models, including personality traits like conscientiousness and states like personal innovativeness with IT.
- CSE is a strong predictor of various important outcomes, including job performance, training satisfaction, motivation to learn, and user engagement.
- Factors such as national culture and the context of computer use (e.g., corporate, educational, consumer) can significantly moderate the strength of relationships between CSE and its antecedents and outcomes.
- The study proposes a new, updated theoretical model of CSE that incorporates these findings to better guide future research and practice in areas like employee training and technology adoption.
Computer Self-Efficacy, Meta-Analysis, Training, National Culture, Personality, Social Cognitive Theory
Theorizing From Contexts in Research With Digital Trace Data

Theorizing From Contexts in Research With Digital Trace Data

Emmanuelle Vaast
This study presents a framework for researchers on how to develop new theories from digital trace data, which are the records of online activities. It provides a systematic methodology for analyzing the specific environments (contexts) in which this data is generated. The approach involves first probing the contexts to understand their scope and then elucidating them to explain the 'who, what, where, when, why, and how' of observed online phenomena.

Problem Researchers increasingly use massive amounts of digital trace data, but this data often lacks the surrounding context needed for accurate interpretation, a challenge known as 'context collapse'. This creates a dilemma for researchers, who may struggle to develop meaningful theories that are both true to the specific context and broadly applicable. Without a proper method, they risk misinterpreting data or overstating the uniqueness of their findings.

Outcome - The paper provides a formal framework for developing theory from the contexts of digital trace data.
- It proposes a two-stage approach: 'Probing Contexts' to surface the broad environment and identify specific settings, and 'Elucidating Contexts' to situate, depict, and explain the phenomena.
- Probing involves identifying the broader 'omnibus' context and the specific 'discrete' contexts from which data originates.
- Elucidating involves a progression of questions (where, when, what, who, how, why) to build a rich, contextualized understanding.
- This framework helps researchers create nuanced and impactful theories that are grounded in the digital evidence.
Digital Trace Data, Contexts, Theory Building, Theorizing, Contextualizing, Phenomenon
How Do Star Contributors Influence the Quality and Popularity of Artifacts in Online Collaboration Communities?

How Do Star Contributors Influence the Quality and Popularity of Artifacts in Online Collaboration Communities?

Onochie Fan-Osuala, Onkar S. Malgonde
This study investigates how star contributors—individuals who make disproportionately large contributions—impact the success of projects in online collaborative environments like GitHub. Using data from over 21,000 open-source software projects from 2015 to 2019, the researchers analyzed how the number and concentration of these key contributors relate to project quality and popularity.

Problem Online collaboration communities are crucial for innovation, but the impact of a small group of highly active 'star' contributors is not well understood. Traditional models of core vs. peripheral members are often too rigid for these fluid environments, leaving a gap in knowledge about how to manage contributions to achieve the best outcomes for a project's quality and community engagement.

Outcome - A moderate number of star contributors is optimal for both project quality and popularity; too few or too many has a negative effect, following an inverted U-shape curve.
- When star contributors are responsible for a larger proportion of the total work, it enhances the project's quality but does not increase its popularity.
- In fast-changing or dynamic project environments, the impact of star contributors on quality and popularity is amplified.
- A key implication is that while star contributors are beneficial, over-reliance on them can negatively affect project outcomes.
Online Collaboration Communities, Peer Production, Core, Periphery, Star Contributors, Hierarchical Linear Modeling, Open Source Software
Load More Showing 54 of 229