232 research outputs found

    The Paradoxical Effects of Blockchain Technology on Social Networking Practices

    Get PDF
    Blockchain technology is a promising, yet not well understood, enabler of large-scale societal and economic change. For instance, blockchain makes it possible for users to securely and profitably share content on social media platforms. In this study, w

    “On Here, I’m Team Jacob: Exploring Feelings of Belongingness in Virtual Communities

    Get PDF
    Virtual communities have become important for enthusiasts to meet, share, and express their affection for a wide range of products, ideas, and brands. While virtual communities have been studied previously, the literature is lacking a perspective on virtual communities surrounding products, ideas and brands that users are embarrassed to admit they care about (that is, that they have a negative public affiliation towards), but that nonetheless are a representation of the user’s identity (brand congruity). This study presents a research model positing that, within a virtual community environment, feelings of negative affiliation and brand congruity will influence users’ feelings of belonging to the virtual community, and negative public affiliation will also moderate the relationship between brand congruity and belongingness. Our results indicate significant relationships between negative public affiliation and brand congruity with feelings of belongingness. Our study has implications for the field, as well as for practitioners

    Doxing and Doxees: A Qualitative Analysis of Victim Experiences and Responses

    Get PDF
    Doxing, a form of adversarial online behavior, is the intentional release of an individual’s personal information with malicious intent. It is increasingly used to threaten, punish, or silence individuals who participate in online communities. Such Doxees often experience extreme and intertwined cyberharassment and physical threats, transforming how they participate in both cyber and physical communities. While prior research has examined the underlying motives of the Doxer, the Doxee’s perspective has remained largely unexplored. Drawing on data about 14 individuals who have experienced Doxing, we examine the consequences of Doxing from the Doxee’s point of view. Employing the lens of approach and avoidance coping, we describe how Doxees respond to a Doxing threat and change their behavior. Our research contributes novel insight and themes related to Doxing. Based on our analysis, we offer an agenda for research and practice to pave the way for exploring Doxing and its remedies

    Six Inversion Strategies for Avoiding Rejection in Academic Publishing: Lessons from the IS Discipline

    Get PDF
    The publication process in many academic disciplines, including in Information Systems (IS), can seem arduous and unpredictable, particularly for early career researchers. While the literature offers plentiful guidance on how to pursue a paper acceptance, this paper offers a crisp summary of common mistakes that lead to rejection and how to avoid them. We provide six actionable inversion strategies for avoiding common mistakes that often lead to paper rejection. Namely, when preparing a paper, we recommend you (1) abstain from methodological promiscuity and (2) never overclaim (but try not to underclaim either); When submitting a paper, it is a good idea to (3) steer clear of bootlicking and (3) avoid sloppiness; And, after receiving the reviews, you should (5) forego belligerence, and (6) stop flogging a dead horse. These inversion strategies can help early career researchers better navigate the review process, increasing the chances of their papers maturing, and helping to avoid mistakes that lower the chance of publishing in high quality IS journals

    Bounded Rationality, Formal Implementation Processes, and Conflicting Subcultures: A Theoretical Framwork

    Get PDF
    This paper develops a theoretical framework for studying how the interaction of individual perceptions, an organizations’ subcultures, and formal information systems (IS) design processes influence the fit of an IS to its respective organization. Building on models of individual decision making, such as bounded rationality, it extends several propositions for how informal and formal structures influence the fit of an IS

    Understanding the Relationship between Goal-Directed Intentions and Post-Adoptive IT Behaviors: The Moderating Influence of Image Compatibility

    Get PDF
    Technology adoption and diffusion research has advanced from examining pre-adoption to uncovering salient predictors of individual post-adoptive IT behaviors. Within this new research stream, there is a need to extend understanding of how and why individuals innovate with IT and infuse it in their work life. To that end, this paper suggests that understanding individuals’ motivations for continuing, extending, or adapting their use behaviors is important in order to develop understanding of how technologies become embedded in organizational work processes. Hence, we propose a research model that examines how compatibility between goals and perceptions of likely progress toward those goals influences an individual’s post-adoptive IT use behavior. Assuming the proposed hypotheses are supported, this study will contribute to the literature by shedding light on factors that trigger variations in post-adoptive IT use

    I vote left, you vote right: How can we work together?

    Get PDF
    Political divisiveness continues to make news and influence our lives. In Spain, the drive for Catalonia’s independence has sparked demonstrations from both sides, including police action to close polling places. In Britain, Brexit aroused a debate marked by strong emotion over the future direction of the country. In the U.S., movements such as Black Lives Matter/Blue Lives Matter, standing for the national anthem, and even monologues from late night comedians engender strong emotions. Polling data in the U.S suggest that major political parties are further apart on basic political values than ever before. We suggest that the strength and ubiquitous nature of political convictions will likely spill over to workplace decision-making

    A Practical Guide for Successful Revisions and Engagements with Reviewers

    Get PDF
    Revising a manuscript after receiving a revise-and-resubmit decision from a top-tier journal can be just as arduous as developing a new paper from scratch. In this editorial, based on our experiences revising papers over the years, we provide roadmaps and guidelines for completing successful revisions for top journals. In doing so, we offer practical tips for completing three major tasks—making sense of a review packet, revising a manuscript, and crafting responses to reviewer comments. We conclude by recommending that authors be active reviewers themselves because, by doing so, they can develop their own insights on how peer review works and become more skillful at revising their papers and responding to reviewers

    Implications of Technological Progress for the Measurement of Technology Acceptance Variables: The Case of Self-efficacy

    Get PDF
    Despite decades of technological and organizational change our research in the area of technology adoption continues to use measures for constructs that were developed during the late 1980s and early 1990s. In this research-in-progress paper, we examine one such measure, computer-self-efficacy. We consider the implications of changing technologies and context and propose a new direction for conceptualizing and measuring self-efficacy. We present an updated conceptualization and a definition for a new construct called Technology Self-efficacy. We describe our process for developing the item pool for this new construct and outline our plans for testing the new instrument’s validity
    • …
    corecore