1,208 research outputs found

    Editorial

    Get PDF
    It is tradition that the Electronic Journal of Information Systems Evaluation (EJISE) publish a special issue containing the full versions of the best papers that were presented in a preliminary version during the 8th European Conference on Information Management and Evaluation (ECIME 2014). The faculty of Economics and Business Administration of the Ghent University was host for this successful conference on 11-12th of September 2014. ECIME 2014 received a submission of 86 abstracts and after the double-blind peer review process, thirty one academic research papers, nine PhD research papers, one master research paper and four work-in-progress papers were accepted and selected for presentation. ECIME 2014 hosted academics from twenty-two nationalities, amongst them: Australia, Belgium, Bosnia and Herzegovina, Brazil, Finland, France, Greece, Ireland, Lebanon, Lithuania, Macedonia (FYROM), Norway, Portugal, Romania, Russia, South Africa, South Korea, Spain, Sweden, The Netherlands, Turkey and the UK. From the thirty-one academic papers presented during the conference nine papers were selected for inclusion in this special issue of EJISE. The selected papers represent empirical work as well as theoretical research on the broad topic of management and evaluation of information systems. The papers show a wide variety of perspectives to deal with the problem

    What Other Factors Might Impact Building Trust in Government Decisions Based on Decision Support Systems, Except for Transparency and Explainability?

    Get PDF
    Decision Support Systems (DSS) are increasingly being used to support operational decision-making using large amounts of data. One key aspect to successful adoption is that the user trusts the DSS. Large contributors to trust often mentioned in literature and practice are transparency and explainability. But what happens when a DSS is transparent and explainable by design? What other contributors to trust are relevant is the main focus of this paper, in the context of Dutch governmental subject-matter experts designing and working with DSSs. We used a Mixed-Method Sequential Explanatory Design in which a survey was conducted to gather empirical data. The findings present 20 focal points contributing toward trust in DSS. These focal points require future research, specifically on considering these for development by the design of a DSS. Ultimately, this could help in increasing the adoption of DSSs in general

    Behind the scenes of emerging technologies Opportunities, challenges, and solution approaches along a socio-technical continuum

    Get PDF
    Digitalization is a socio-technical phenomenon that shapes our lives as individuals, economies, and societies. The perceived complexity of technologies continues to increase, and technology convergence makes a clear separation between technologies impossible. A good example of this is the Internet of Things (IoT) with its embedded Artificial Intelligence (AI). Furthermore, a separation of the social and the technical component has become near enough impossible, for which there is increasing awareness in the Information Systems (IS) community. Overall, emerging technologies such as AI or IoT are becoming less understandable and transparent, which is evident for instance when AI is described in terms of a black box. This opacity undermines humans trust in emerging technologies, which, however, is crucial for both its usage and spread, especially as emerging technologies start to perform tasks that bear high risks for humans, such as autonomous driving. Critical perspectives on emerging technologies are often discussed in terms of ethics, including such aspects as the responsibility for decisions made by algorithms, the limited data privacy, and the moral values that are encoded in technology. In sum, the varied opportunities that come with digitalization are accompanied by significant challenges. Research on the negative ramifications of AI is crucial if we are to foster a human-centered technological development that is not simply driven by opportunities but by utility for humanity. As the IS community is positioned at the intersection of the technological and the social context, it plays a central role in finding answers to the question as to how the advantages outweigh the challenges that come with emerging technologies. Challenges are examined under the label of dark side of IS, a research area which receives considerably less attention in existing literature than the positive aspects (Gimpel & Schmied, 2019). With its focus on challenges, this dissertation aims to counterbalance this. Since the remit of IS research is the entire information system, rather than merely the technology, humanistic and instrumental goals ought to be considered in equal measure. This dissertation follows calls for research for a healthy distribution along the so-called socio-technical continuum (Sarker et al., 2019), that broadens its focus to include the social as well as the technical, rather than looking at one or the other. With that in mind, this dissertation aims to advance knowledge on IS with regard to opportunities, and in particular with a focus on challenges of two emerging technologies, IoT and AI, along the socio-technical continuum. This dissertation provides novel insights for individuals to better understand opportunities, but in particular possible negative side effects. It guides organizations on how to address these challenges and suggests not only the necessity of further research along the socio-technical continuum but also several ideas on where to take this future research. Chapter 2 contributes to research on opportunities and challenges of IoT. Section 2.1 identifies and structures opportunities that IoT devices provide for retail commerce customers. By conducting a structured literature review, affordances are identified, and by examining a sample of 337 IoT devices, completeness and parsimony are validated. Section 2.2 takes a close look at the ethical challenges posed by IoT, also known as IoT ethics. Based on a structured literature review, it first identifies and structures IoT ethics, then provides detailed guidance for further research in this important and yet under-appreciated field of study. Together, these two research articles underline that IoT has the potential to radically transform our lives, but they also illustrate the urgent need for further research on possible ethical issues that are associated with IoTs specific features. Chapter 3 contributes to research on AI along the socio-technical continuum. Section 3.1 examines algorithms underlying AI. Through a structured literature review and semi-structured interviews analyzed with a qualitative content analysis, this section identifies, structures and communicates concerns about algorithmic decision-making and is supposed to improve offers and services. Section 3.2 takes a deep dive into the concept of moral agency in AI to discuss whether responsibility in human-computer interaction can be grasped better with the concept of agency. In section 3.3, data from an online experiment with a self-developed AI system is used to examine the role of a users domain-specific expertise in trusting and following suggestions from AI decision support systems. Finally, section 3.4 draws on design science research to present a framework for ethical software development that considers ethical issues from the beginning of the design and development process. By looking at the multiple facets of this topic, these four research articles ought to guide practitioners in deciding which challenges to consider during product development. With a view to subsequent steps, they also offer first ideas on how these challenges could be addressed. Furthermore, the articles offer a basis for further, solution-oriented research on AIs challenges and encourage users to form their own, informed, opinions.Die Digitalisierung ist ein sozio-technisches Phänomen, das unser persönliches Leben, aber auch die Wirtschaft und die gesamte Gesellschaft prägt. Die wahrgenommene Komplexität von Technologie nimmt stetig zu. Die Technologiekonvergenz macht eine klare Trennung zwischen Technologien praktisch unmöglich, wofür das Internet der Dinge (IoT) mit seiner eingebetteten Künstlichen Intelligenz (KI) ein gutes Beispiel ist. Darüber hinaus wird eine Trennung der sozialen und der technischen Komponente nahezu unmöglich, wofür es ein steigendes Bewusstsein in der Information Systems (IS) Community gibt. Insgesamt werden aufstrebende Technologien wie KI oder IoT weniger verständlich und transparent, was sich beispielsweise darin zeigt, dass KI der Begriff der Black Box zugeschrieben wird. Die Undurchsichtigkeit untergräbt das Vertrauen der Menschen in aufstrebende Technologien, das jedoch für die Nutzung und Verbreitung dieser entscheidend ist, insbesondere wenn Technologien Aufgaben übernehmen oder unterstützen, die hohe Risiken für den Menschen bergen, wie z. B. autonomes Fahren. Kritische Perspektiven auf neue Technologien werden oft unter dem Begriff der Ethik diskutiert, darunter Aspekte wie die Verantwortung für Entscheidungen, die von Algorithmen getroffen werden, moralische Werte, die in die Technologie eingebettet sind, und Datenschutz. Zusammenfassend lässt sich sagen, dass die vielfältigen Chancen der Digitalisierung mit Herausforderungen einhergehen. Die Forschung zu Risiken und Nebenwirkungen ist entscheidend, um eine menschenzentrierte technologische Entwicklung zu fördern, die nicht nur von den Möglichkeiten, sondern insbesondere vom Nutzenstiften für die Menschheit getrieben ist. An der Schnittstelle zwischen Technologie und sozialem Kontext angesiedelt, spielt die IS-Community eine wichtige Rolle bei der Suche nach Antworten auf die Frage, wie die Vorteile die Risiken neuer Technologien überwiegen können. Herausforderungen werden im Forschungsbereich dark side of IS untersucht, welcher in der bestehenden Literatur deutlich weniger Aufmerksamkeit erhält als die positiven Aspekte (Gimpel & Schmied, 2019). Dem möchte diese Dissertation ein Stück weit entgegenwirken, indem ein Fokus auf die Herausforderungen gelegt wird. Da in der IS-Forschung das gesamte Informationssystem und nicht nur die Technologie im Mittelpunkt der Betrachtung steht, sollen humanistische und instrumentelle Ziele gleichermaßen berücksichtigt werden. Darüber hinaus folgt diese Dissertation dem Aufruf nach einer angemessenen Verteilung der Forschung entlang des sogenannten sozio-technischen Kontinuums (Sarker et al., 2019) und löst sich somit von Forschung, die am sozialen oder technischen Endpunkt des Kontinuums angesiedelt ist. Zusammenfassend zielt diese Dissertation darauf ab, das Wissen über IS im Hinblick auf die Chancen und insbesondere die Herausforderungen entlang des sozio-technischen Kontinuums der aufkommenden Technologien IoT und KI voranzutreiben. Damit liefert die Dissertation neue Einblicke für Individuen, um die Möglichkeiten, aber insbesondere die potenziellen negativen Nebenwirkungen der Digitalisierung besser zu verstehen, bietet Orientierung für Organisationen, um diese Herausforderungen zu adressieren, und veranschaulicht die Notwendigkeit und Ideen für weitere Forschung entlang des sozio-technischen Kontinuums. Kapitel 2 leistet einen Beitrag zur Forschung über Chancen und Herausforderungen des IoT. Kapitel 2.1 identifiziert und strukturiert Chancen von IoT-Geräten für Kunden im Einzelhandel. Mit einer strukturierten Literaturrecherche werden Affordanzen von IoT-Geräten für Kunden identifiziert und mit einer Stichprobe von 337 IoT-Geräten wird eine Validierung hinsichtlich Vollständigkeit und Sparsamkeit durchgeführt. Kapitel 2.2 beschäftigt sich mit ethischen Herausforderungen des IoT, genannt IoT-Ethik. Basierend auf einer strukturierten Literaturrecherche identifiziert und strukturiert es die IoT-Ethik und gibt detaillierte Hinweise für die weitere Erforschung dieses wichtigen, aber noch zu wenig erforschten Feldes. Mit diesen beiden Forschungsartikeln unterstreicht diese Dissertation das Potenzial des IoT, unser Leben radikal zu verändern, verdeutlicht aber auch den Bedarf an weiterer Forschung zu potenziellen ethischen Fragen, die mit den spezifischen Eigenschaften des IoT verbunden sind. Kapitel 3 trägt zur Forschung über KI entlang des sozio-technischen Kontinuums bei. Kapitel 3.1 untersucht die Algorithmen, die KI zugrunde liegen. Eine strukturierte Literaturrecherche und semi-strukturierte Interviews, die mit einer qualitativen Inhaltsanalyse analysiert werden, zielen darauf ab, Bedenken gegenüber algorithmischer Entscheidungsfindung zu identifizieren, zu strukturieren und zu kommunizieren, um darauf basierend Angebote und Dienstleistungen zu verbessern. Kapitel 3.2 bietet eine ethische Vertiefung in das Konzept der moralischen Handlungsfähigkeit und untersucht, ob Verantwortung in der Mensch-Computer-Interaktion mit dem Konzept der Agency besser erfasst werden kann. In Kapitel 3.3 wird anhand von Daten aus einem Online-Experiment mit einem selbst entwickelten KI-System untersucht, welche Rolle das domänenspezifische Fachwissen der Nutzer für das Vertrauen in und das Befolgen von Vorschlägen von KI-Entscheidungsunterstützungssystemen spielt. Schließlich wird in Kapitel 3.4 auf der Grundlage designwissenschaftlicher Forschung ein Rahmenwerk für ethische Softwareentwicklung vorgestellt, das ethische Aspekte bereits zu Beginn des Design- und Entwicklungsprozesses berücksichtigt. Diese vier Forschungsartikel können Praktikern als Orientierung dienen, welche Herausforderungen bei der Produktentwicklung zu berücksichtigen sind und bieten erste Ideen, wie sie diese angehen können. Darüber hinaus bieten die Forschungsergebnisse eine Grundlage für weitere, lösungsorientierte Forschung zu den Herausforderungen von KI und ermutigen Nutzer, sich eine eigene, fundierte Meinung zu bilden

    Trust, Accountability, and Autonomy in Knowledge Graph-based AI for Self-determination

    Full text link
    Knowledge Graphs (KGs) have emerged as fundamental platforms for powering intelligent decision-making and a wide range of Artificial Intelligence (AI) services across major corporations such as Google, Walmart, and AirBnb. KGs complement Machine Learning (ML) algorithms by providing data context and semantics, thereby enabling further inference and question-answering capabilities. The integration of KGs with neuronal learning (e.g., Large Language Models (LLMs)) is currently a topic of active research, commonly named neuro-symbolic AI. Despite the numerous benefits that can be accomplished with KG-based AI, its growing ubiquity within online services may result in the loss of self-determination for citizens as a fundamental societal issue. The more we rely on these technologies, which are often centralised, the less citizens will be able to determine their own destinies. To counter this threat, AI regulation, such as the European Union (EU) AI Act, is being proposed in certain regions. The regulation sets what technologists need to do, leading to questions concerning: How can the output of AI systems be trusted? What is needed to ensure that the data fuelling and the inner workings of these artefacts are transparent? How can AI be made accountable for its decision-making? This paper conceptualises the foundational topics and research pillars to support KG-based AI for self-determination. Drawing upon this conceptual framework, challenges and opportunities for citizen self-determination are illustrated and analysed in a real-world scenario. As a result, we propose a research agenda aimed at accomplishing the recommended objectives

    INTERNATIONAL BLOCKCHAIN REGULATION: REGULATION BY CODE – OUTLAWS OR NEW CONCEPTIONS OF LAW?

    Get PDF
    Blockchain technology and globalization have challenged the dynamics of governments as regulators, the sovereignty of nation states, and understanding of jurisdiction. The role of private transnational actors has increased in the globalized world, and they have the power to influence human behavior and cause effects similar to positive law. The separate nature of cyberspace has generated jurisdictional discussions of cyberspace and whether cyberspace should form its own legal system with separate laws applicable. Technological change is rapid, and the development of international regulation has been lagging behind. Another regulatory challenge with blockchain technology is that it is based on network communication and has developed communities of private actors participating in the network. The need for international regulatory harmonization is recognized while it must be considered if traditional governance models are even optimal for blockchain technology. This research analyzes jurisdictional premises and the limitations that blockchain technology that is occurring in cyberspace has posed to traditional jurisdictional concepts. The central part of the jurisdictional discussions is the concept of cyberspace jurisdiction and the frameworks of Lex Informatica, Lex Cryptographia, and Code is Law. After jurisdictional analysis, the current state of international blockchain regulation is analyzed with a new framework developed for blockchain technology and an existing one in order to resolve if current regulation could be adopted to blockchain technology. The research has a de lege ferenda approach with regulatory governance, and the regulatory governance solutions for blockchain technology will be analyzed. The theoretical background of the research is critical technological determinism, and the key references are articles from legal journals and the principles of public international law. The summarized findings of this research are that the jurisdictional framework features technological determinism, and the possibilities of existing tools of international law to solve jurisdictional issues are overlooked. However, the role of transnational private actors is relevant for the development of blockchain regulation, and traditional government-oriented governance methods may not be optimal solutions for blockchain technology.Lohkoketjuteknologia ja globalisaatio ovat haastaneet hallitusten asemaa sääntelyviranomaisina, valtioiden suvereniteettia ja ymmärrystä lainkäyttövallasta. Yksityisten monikansallisten toimijoiden asema on kasvanut globaalissa maailmassa, ja heillä on kyky vaikuttaa ihmisten käyttäytymiseen luoden positiivisen oikeuden kaltaisia vaikutuksia. Kyberavaruuden erillisyys on saanut aikaan kyberavaruuden lainkäyttövaltaan liittyviä keskusteluja sekä sen, kuuluisiko kyberavaruuden muodostaa oma oikeusjärjestelmänsä, johon pätee erilliset sovellettavat lait. Teknologian muutos on nopeaa, ja kansainvälisen lainsäädännön kehitys on laahannut perässä. Lisäksi lohkoketjuteknologiaan liittyvä lainsäädännöllinen haaste on se, että lohkoketju perustuu tietoverkon kommunikaatioon ja se on perustanut yksityisiä yhteisöjä teknologian ympärille. Tarve kansainvälisen sääntelyn harmonisoinnille on tunnistettu, mutta samaan aikaan on harkittava soveltuvatko perinteiset hallintomallit optimaalisimmalla tavalla lohkoketjuteknologialle. Tämä tutkimus analysoi lainkäyttövallan perusteita ja niitä rajoitteita, joita kyberavaruudessa toimiva lohkoketjuteknologia on aiheuttanut perinteisille lainkäyttövallan käsitteille. Keskeinen osa lainkäyttövallan analyysia on kyberavaruuden lainkäyttövallan käsite ja Lex Informatica, Lex Cryptographia ja Code is Law -viitekehykset. Lainkäyttövallan analyysin jälkeen lohkoketjuteknologian kansainvälisen sääntelyn tila analysoidaan uuden lohkoketjuteknologialle luodun viitekehyksen sekä olemassa olevan viitekehyksen avulla, jonka avulla selvitetään, voidaanko nykyistä lainsäädäntöä hyödyntää lohkoketjuteknologialle. Tällä tutkimuksella on de lege ferenda -lähestyminen lainsäädännön hallintotapaan, ja hallintotaparatkaisut lohkoketjuteknologialle ovat osa analyysia. Tutkimuksen teoreettinen tausta on kriittinen teknologinen determinismi. Keskeiset lähteet ovat oikeustieteellisissä lehdissä julkaistut artikkelit sekä kansainvälisen oikeuden periaatteet. Tiivistetysti tutkimuksen loppupäätelminä voidaan todeta, että lainkäyttövallan viitekehykset ilmentävät teknologista determinismiä ja voimassa olevan kansainvälisen oikeuden mahdollisuudet ratkaista lainkäyttövaltaan liittyviä ongelmia on sivuutettu. Kuitenkin on syytä huomioida, että monikansallisten yksityisten tahojen rooli on merkityksellinen kehitettäessä lohkoketjusääntelyä ja perinteiset hallituskeskittyneet hallintomallit eivät välttämättä ole kaikista optimaalisimpia ratkaisuja lohkoketjuteknologialle

    Blockchain Technology for Secure Accounting Management: Research Trends Analysis

    Get PDF
    The scope of blockchain technology, initially associated with the cryptocurrency Bitcoin, is greater due to the multiple applications in various disciplines. Its use in accounting lies mainly in the fact that it reduces risks and the eventuality of fraud, eliminates human error, promotes efficiency, and increases transparency and reliability. This means that different economic sectors assume it as a recording and management instrument. The aim is to examine current and emerging research lines at a global level on blockchain technology for secure accounting management. The evolution of the publication of the number of articles between 2016 and 2020 was analyzed. Statistical and mathematical techniques were applied to a sample of 1130 records from the Scopus database. The data uncovered a polynomial trend in this period. The seven main lines of work were identified: blockchain, network security, information management, digital storage, edge computing, commerce, and the Internet of Things. The ten most outstanding emerging research lines are detected. This study provides the past and future thematic axes on this incipient field of knowledge, which is a tool for decision-making by academics, researchers, and directors of research investment program

    Data ethics : building trust : how digital technologies can serve humanity

    Get PDF
    Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century: For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car, from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad, for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world? How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication. The authors and institutions come from all continents. The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust! The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors

    The Mechanisms of Interpersonal Privacy in Social Networking Websites: A Study of Subconscious Processes, Social Network Analysis, and Fear of Social Exclusion

    Get PDF
    With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following question: How does privacy influence the sharing of personal information in interpersonal relationships on Social networking sites? The management of the sharing of personal information is explained using the Need to Belong theory, psychological contract, and approach-avoidance motivation theory. Individuals\u27 desire to interact Socially and engage in relationships where respect for personal information is implied leads to overcoming concerns over privacy. Three essays address the question of interest. Essay 1 explains that this drive is motivated by a fear of Social exclusion from Social transactions and interpersonal relationships and does not rely on the institutional relationship between a user and the Social media website. Essay 2 uses a Social network analysis lens to describe how the multiplexity of relationships and Social influences (both of the network and the self) influence Social interaction and the sharing of personal information. Essay 3 focuses on explaining how individuals\u27 disposition toward subconscious processes of approach or avoidance motivation influence decisions to share and not share personal information. The implication of these studies is that privacy in a process-oriented context--like Facebook--involves different attitudes and beliefs centered on interpersonal relationships rather than institutional ones
    corecore