首页期刊导航|Journal of management information systems
期刊信息/Journal information
Journal of management information systems
M.E. Sharpe Inc.
Journal of management information systems

M.E. Sharpe Inc.

季刊

0742-1222

Journal of management information systems/Journal Journal of management information systemsISSHPEIAHCISCI
正式出版
收录年代

    Editorial Introduction

    Vladimir Zwass
    1035-1038页
    查看更多>>摘要:Two sets of papers investigating the top-of-the-mind problems of today open this Journal of Management Information Systems (JMIS) issue that completes the 40th -anniversary volume of the Journal. The first set presents the results of the impactful research on the interaction between humans and artificial intelligence (AI). The current and coming generative AI generates optimism regarding the new levels of human accomplishment when assisted across their working and private lives. Its promise contains a quantum productivity growth, which can lift billions out of poverty and toward expanded horizons. More specific to the information-systems' (IS) concerns, the ability of the generative AI to generate software code leads directly to what we may call implicit development by the end users who are able to specify their needs in a natural language. As a general-purpose technology, the new AI also produces high levels of anxiety regarding the availability of employment and, beyond that, the very survival of the humans when facing AI. The work on the guardrails is clearly to be praised, if its effectiveness in the present geopolitical environment is to be questioned. The two papers opening the issue address, respectively, the role of AI in the competition and in the collaboration with people.

    Perceived Fairness of Human Managers Compared with Artificial Intelligence in Employee Performance Evaluation

    Shaojun (Marco) QinNan JiaXueming LuoChengcheng Liao...
    1039-1070页
    查看更多>>摘要:Human managers are increasingly challenged by artificial intelligence (AI) technologies in performing managerial functions. We undertook a field experiment that used AI vis-a-vis human managers to perform structured, data-intensive evaluations of employee performance. We generate two sets of insights. First, employees considered AI to be both fairer and more accurate in evaluating their performance than the average human manager. Second, to catch up with AI, human managers' fairness perceived by employees played a first-order role by (a) helping human managers, to a greater extent than those managers' evaluation accuracy, to close the performance gap of the employees evaluated by them compared with that of those evaluated by AI, and (b) constraining the effect of human managers' perceived accuracy of evaluations on employees' performance. Thus, facing the competition from AI, it is all the more important for human managers to treat employees fairly and build positive interpersonal relationships with employees.

    Human-Artificial Intelligence Collaboration in Prediction: A Field Experiment in the Retail Industry

    Elena RevillaMaria Jesus SaenzMatthias SeifterYe Ma...
    1071-1098页
    查看更多>>摘要:This study investigates the role of human intervention in artificial intelligence/machine learning (AIML)-driven predictions. By doing so, we distinguish between three different types of human-AIML collaboration: automation, adjustable automation, and augmentation. We theorize that prediction uncertainty and time horizon represent two critical determinants of forecast accuracy. Based on a field experiment involving AIML-driven demand forecasts approximately 1,888 stock-keeping units in the retail industry, we rely on a multivalued treatment effect methodology to measure the effects of human-AIML collaboration on forecast accuracy. Our findings show that human intervention complements AIML-driven forecasts most effectively (augmentation) in predictions with long time horizons and low uncertainty. However human intervention is least likely to contribute to the effectiveness of AIML predictions (automation) in environments with short time horizons and high uncertainty. We discuss implications for extant theory and propose a framework outlining the conditions in which human intervention is most likely to add predictive value to human-AIML collaborations.

    Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Ana lysis

    Paul Benjamin LowryGregory D. MoodySrikanth ParameswaranNicholas James Brown...
    1099-1138页
    查看更多>>摘要:Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, as well as their derivative theories, in a variety of ways, leading to several theoretical and empirical inconsistencies. The large body of fragmented, and sometimes conflicting, research has muddied the broader understanding of what drives protection-and defensive motivation. We provide guidance to the security discourse by offering the first study in the literature to employ two-stage meta-analytic structural equation modeling (TSSEM), which combines covariance-based structural equation modeling and meta-analysis. Information systems (IS) researchers have traditionally used meta-analysis for structural equation modeling for such purposes-an approach that has several serious statistical flaws. Using 341 systematically selected empirical security articles (representing 383 unique studies) and TSSEM, we pool a large series of five datasets to test six models, from which we examine the effects of constructs and paths in the security fear-appeals literature. We compare and test six versions of models inspired by issues in the broader fear-appeals literature. We confirm the importance of both the threat- and coping-appraisal processes; establish the central role of fear and that it has greater importance than threat; show that efficacy is a stronger predictor of protection motivation than is threat; demonstrate that response costs as currently measured are ineffective but that maladaptive rewards have a strong negative effect on protection motivation and a positive effect on defensive motivation; and provide evidence that dual models of danger control and fear control should be used.

    Information Technology Innovatlveness and Data-Breach Risk: A Longitudinal Study

    Qian WangEric W. T. NgaiDaniel PientaJason Bennett Thatche...
    1139-1170页
    查看更多>>摘要:The adoption of new Information Technology (IT) innovations has led to increased uncertainty among employees, a greater demand for security measures, and more entry points for cyber-attacks, which all increase the risk of data breaches for firms. Despite the prevalence of discussions around this issue, there has been a lack of empirical research examining the data breach risk associated with IT innovations. To address this gap, we have developed arguments based on an organizational learning theoretical framework that explains how IT innovativeness can exacerbate data breach risk. Through our analysis of a sample of data breaches that occurred between 2013 and 2021, we have discovered that there is a positive association between firm IT innovativeness and the risk of data breaches. We also find that the effects of IT innovativeness can vary under certain conditions. For example, we find that the positive relationship between IT innovativeness and data breach risk is mitigated when managers possess IT expertise or when firms have established extensive board connections with cybersecurity managers. Moreover, we find that the relationship between IT innovativeness and data breach risk is amplified in complex environments but not in dynamic or munificent ones. This study takes the lead in advancing the theoretical understanding and empirical validation of security-related risks associated with IT innovations. Moreover, our findings serve as a timely reminder for research and practice to carefully consider the implications of introducing novel technologies into firms and the potential dark side consequences that may arise. Additionally, this study underscores the importance of understanding organizational learning in risk assessment and change management, as well as the critical role of contextual factors in moderating the unintended security-related consequences linked to IT innovations.

    Avatar-Mediated Communication and Social Identification

    Ching-I TengAlan R. DennisAlexander S. Dennis
    1171-1201页
    查看更多>>摘要:Avatar-mediated communication (AMC), commonly used in online environments such as games and the emerging metaverse, is different from traditional computer-mediated communication in that it is a human-object-object-human relationship mediated by the individual's avatar and the avatar of the person with whom they are communicating. We conceptualize AMC by using three key concepts: user-avatar identification (i.e., how a user perceives their avatar as themselves), avatar-avatar identification (i.e., how a user perceives their avatar as part of a community of avatars), and social presence (i.e., how a user perceives the other avatar as a representation of the other person). We tested this model using 778 individuals who responded to three waves of data collection. The results show that the three factors of AMC influence users' social identification with their community and strengthen its impact on loyalty. From a theoretical perspective, our research adds two novel constructs-user-avatar identification and avatar-avatar identification-that play key roles in AMC in addition to the well-known effects of social presence. From a practical perspective, our research helps developers better design online games and virtual worlds such as the metaverse.

    Foreignness Liability of Mobile App Startups: Examining Performance in the Context of Consumer and Investor Cultural Distances

    Franck SohVarun Grover
    1202-1236页
    查看更多>>摘要:Mobile platforms provide important entrepreneurial opportunities by facilitating access to a global market composed of more than a hundred countries. These opportunities are crucial for mobile app startups as they seek to reach a wider audience and accelerate growth. Nevertheless, performing in foreign countries is challenging as mobile app startups face a "foreignness liability" since they are competing against complementors (i.e., app developers) who have experience in their domestic market. We offer a research model that assesses the impact of cultural distance on the app-level performance of mobile app startups in foreign countries. We hypothesize the moderating effects of investor-consumer cultural distance and environmental characteristics within foreign countries. We test the model using a dataset of over 550 mobile app startups operating on the iOS platform. Our findings support our hypotheses and provide insights into whether mobile platforms are level playing fields. Our study sheds light on the interactions between a startup and its investors' cultural distances highlighting configurations of cultural distance that are beneficial for app performance in foreign countries when the environment is stable or uncertain.

    Impact of Open-Source Community on Cryptocurrency Market Price: An Empirical Investigation

    Mariia PetrykLiangfei QiuPraveen Pathak
    1237-1270页
    查看更多>>摘要:Although the prices of cryptocurrencies remained volatile for the past decade, the factors that impact the price dynamics of the new type of investment instrument have not been fully identified yet. In this study, we recognize the dual nature of cryptocurrencies, that is, being a software program and a financial instrument, and examine the impact of software advancement on the price dynamics of cryptocurrencies. The open-source software (OSS) platform functionality enables social behaviors that we use as signals. Using data from the largest OSS platform, we establish the connection between open-source activities and the price movement of cryptocurrency. In particular, as project popularity (forks and watches) and users' feedback (issues) increase, the market price increases by 4.3 percent, 2.4 percent, and 4.4 percent per annum, respectively. On the contrary, the number of code corrections (pull requests) is negatively related to prices leading to a 5 percent annual price decrease. Our results suggest that OSS contributions create a perfect selection mechanism, where higher quality projects receive more developers' attention and user feedback, whereas lower quality projects do not, thus creating the separating equilibrium.

    Impacts of Social Interactions and Peer Evaluations on Online Review Platforms

    Yinan YuWarut Khern-am-nuaiAlain PinsonneaultZaiyan Wei...
    1271-1300页
    查看更多>>摘要:Social technologies on online review platforms enable social interactions among users, such as establishing following relationships and commenting on others' posts. Although it is well recognized that more socially engaged reviewers tend to be more active and generate content of higher quality, our knowledge about the impact of social interactions on peer evaluations of reviews is limited. To address this issue, we use a unique dataset from a major online review platform and find that, ceteris paribus, reviews posted by more socially engaged users receive more helpfulness votes than those posted by less socially engaged users. Similarly, users tend to vote more for reviews written by their mutual followers than for those written by nonfollowers. In addition, we find that less socially engaged users review a broader range of products and services but are less likely to stay on a platform, which may further contribute to the inflation of peer evaluations (toward online reviews). Our study provides unique empirical evidence regarding the influence of social interactions on review evaluations. Furthermore, we caution researchers and practitioners against utilizing review helpfulness scores as a sole measure for review quality and diagnosticity.

    Digitalization of Loyalty: Impacts of Mobile Technology on Reward Redemption and Engagement Level

    Yoonseock SonWonseok Oh
    1301-1327页
    查看更多>>摘要:Although digitalization is a prevalent strategy in reward programs, a minimal amount is known regarding the relationship between reward app usage and reward redemption behaviors. The enhanced availability and accessibility of information via mobile app can alter customers' reward-redemption patterns and engagement level, highlighting the need for firms to adjust their reward-based service strategies. Using unique datasets that reflect individual consumers' transactional and reward redemption behaviors, we conducted a series of analyses to capture the dynamics in the latent engagement state transitions of customers according to the type of reward program used. Results show that although reward app usage, on average, induces a more active engagement state, it polarizes the volatility of engagement state transitions. Furthermore, we find that greater volatility of engagement state transitions is significantly associated with a higher likelihood of churn. Finally, a follow-up survey and panel vector autoregression analyses are conducted to uncover the mechanisms that underlie the relationship. The results provide insights into how retailers can strategically design their reward programs in the emerging mobile-based omnichannel environment.