首页期刊导航|European journal of information systems
期刊信息/Journal information
European journal of information systems
Operational Research Society
European journal of information systems

Operational Research Society

0960-085X

European journal of information systems/Journal European journal of information systemsSCIISTPAHCI
正式出版
收录年代

    Responsible AI starts with the artifact: Challenging the concept of responsible AI in IS research

    Patrick MikalefAlexander BenlianKieran ConboyMonideepa Tarafdar...
    407-414页

    Impact of strategic capabilities on digital transformation success and firm performance: theory and empirical evidence

    Pauline WeritzJessica BraojosJorge MatuteJose Benitez...
    415-435页
    查看更多>>摘要:ABSTRACT What is needed for organisations to succeed in digital transformation, and what is its advantage? Motivated by the ongoing high amount of failing digital transformations, this study identifies necessary predictors and outcomes of this prominent matter on the macro level. Drawing on strategic capabilities as enablers for the redefinition of business value and organisational identity in the digital era, we propose that the complementary synergies of strategic capabilities empower digital transformation success, improving firm performance. The results support the proposed model using structural equations modelling with multi-data from 154 organisations and complementary objective data. This study identifies synergistic facilitators for digital transformation success by providing an integrated portfolio of complementary capabilities (i.e., outside-in, spanning, and inside-out orientation). The study also contributes to IS research by offering a measurable conceptualisation of digital transformation success. In addition, findings empirically show the association between digital transformation success and firm performance to enable further investigations in the IS field. Finally, from the study’s findings, practical implications can guide organisations towards digital transformation success and firm performance.

    Weathering the storm: examining how organisations navigate the sea of cybersecurity regulations

    Jeffrey G. ProudfootW. Alec CramStuart Madnick
    436-459页
    查看更多>>摘要:ABSTRACT Governments around the world routinely regulate the activities of private enterprises to guide the behaviour of individuals and organisations towards acceptable norms. This holds true in a cybersecurity context. However, practitioners report that cybersecurity regulations are often out of date and compliance is confusing, expensive, and time consuming. As a result, organisational leaders are often uncertain about the practicalities of adopting and implementing the various rules, which can lead to trickle-down effects on the robustness of lower-level cybersecurity controls and compliance activities. In this research, we aim to clarify how cybersecurity regulations are operationalised in organisations, as well as reveal the compliance and performance consequences of cybersecurity regulations. To do so, we interviewed 22 senior leaders with expertise in cybersecurity regulations. Our analysis reveals 7 distinct themes (i.e., concept groupings) that are ordered within four phases (i.e., temporal stages), which we use to create the Institutional Cybersecurity Regulations Model (ICRM). The results provide a holistic view of the cybersecurity regulations process in organisations that can serve to clarify current theory relationships and inform future research. As well, the ICRM can provide a practical roadmap for managers to navigate regulatory cybersecurity challenges in their own companies.

    The influence of affective processing on phishing susceptibility

    Chuan (Annie) TianMatthew L. JensenGreg BottXin (Robert) Luo...
    460-474页
    查看更多>>摘要:ABSTRACT The heightened sophistication of phishing attacks results in billions of dollars of financial losses, loss of intellectual property, and reputational damage to organisations. Past work examining determinants of phishing susceptibility has been dominated by cognitive theoretical perspectives. However, recent research has also revealed the importance of emotion in phishing susceptibility. This study expands our understanding of phishing susceptibility by adopting an affective lens. Using an integrative perspective of emotion, we build on the Affective Infusion Model (AIM) to predict the effects of valence, certainty, and arousal on phishing susceptibility. We pilot our manipulations (N = 241) and then test our hypotheses using a mock phishing experiment (N = 474) in which phishing messages are sent directly to participant inboxes. We demonstrate that messages inducing positive valence and low certainty result in higher phishing susceptibility. This study contributes to phishing literature by illuminating the critical role that emotion plays in altering recipients’ susceptibility in the processing of phishing messages and has implications for scholars, practitioners, and organisations.

    Uncovering post-adoption usage of AI-based voice assistants: a technology affordance lens using a mixed-methods approach

    Zhen ShaoJing ZhangLin ZhangJose Benitez...
    475-501页
    查看更多>>摘要:ABSTRACT Despite the growing proliferation of AI-based voice assistants in our daily lives, how different functions of AI-based voice assistants affect users’ post-adoption usage behaviours remains an under-investigated research question. This study explores the nature and causation of post-adoption usage behaviours (effective utilisation after initial adoption or diffusion) within the context of AI-based voice assistants. Using a sequential mixed-methods research design, we first identify the post-adoption usage behaviours of AI-based voice assistants as a multidimensional concept comprised of routine use and extended use, then develop a contextualised model by revealing technology-specific antecedents, cognitive beliefs, and boundary conditions. By integrating results from the quantitative study and qualitative study, we find that three technology affordances (i.e., anthropomorphism affordance, interactivity affordance, and personalisation affordance) are salient antecedents of two cognitive beliefs, which further affect users’ routine use and extended use of AI-based voice assistants. Additionally, we uncover use frequency as a boundary condition and obtain a complementary view of post-adoption usage of AI-based voice assistants. The empirical research findings can extend the post-adoption IS usage literature and provide practical implications for crafting user-centred functionalities to facilitate effective human-AI interactions.

    How does big data analytics capability affect firm performance? Unveiling the role of organisational resilience and environmental dynamism

    Jiabao LinShaowu WuXin (Robert) Luo
    502-528页
    查看更多>>摘要:ABSTRACT In a dynamic environment, organisations are increasingly compelled to utilise big data analytics (BDA) to develop organisational resilience, which will help them weather disruptions and gain competitiveness. By investigating 213 Chinese firms across a diverse array of industries, this study seeks to uncover the mechanisms and boundary conditions through which BDA capability affects firm performance. Drawing on the organisational capabilities-based theory and information technology-enabled organisational capabilities perspective, we both theoretically and empirically verify that two types of organisational resilience (i.e., proactive resilience and reactive resilience) mediate the relationship between BDA capability and firm performance. Our findings reveal that environmental dynamism positively moderates the impact of BDA capability on reactive resilience and strengthens the positive mediation effect of reactive resilience on the relationship between BDA capability and firm performance. This study contributes to the information systems literature by theoretically and empirically clarifying the pivotal roles of proactive resilience and reactive resilience as mediating mechanisms and by describing the contingent effect of environmental dynamism on the relationship between BDA capability and performance. The results provide new insights into how managers deploy BDA to achieve superior performance in a dynamic environment.

    Structural power imbalances in global organisations: analysing IT governance from a postcolonial perspective

    Marie-E. GodefroidVincent BorghoffRalf PlattfautBjörn Niehaves...
    529-550页
    查看更多>>摘要:ABSTRACT IT governance has the potential to perpetuate power imbalances in international organisations. Important IT decisions are frequently made in the headquarters and then propagated through the rest of the organisation. This pattern can indicate a well-organised centralised IT governance focusing on security and efficiency. The same pattern, however, cannot only impede innovation and flexibility but also has the potential to continue colonial decision structures, especially as headquarters are often in the global north. Through 27 interviews with NGO representatives – a sector that should be highly motivated to counter postcolonial tendencies – we examine IT governance structures. We observe indications of a mismatch between organisational goals and IT governance structures that can only be explained when considering postcolonialism. We need to combine explanation approaches from IT governance and postcolonial theory to explain the observed phenomenon fully. Moreover, we critically comment on IT-related decision-making structures and call for more effort in research and practice to decolonise IT and IT governance.

    Should PLS become factor-based or should CB-SEM become composite-based? Both!

    Jörg HenselerFlorian Schuberth
    551-563页
    查看更多>>摘要:ABSTRACT This paper critically discusses a recent EJIS paper entitled “Will PLS have to become factor-based to survive and thrive?”, which laments that covariance-based structural equation modelling cannot handle composite models, postulates that PLS should become factor-based, and advocates the use of the PLSF-SEM method. We clarify that covariance-based structural equation modelling can handle composite models, e.g. using the so-called Henseler – Ogasawara specification, agree that PLS in its original form cannot consistently estimate the parameters of reflective measurement models, and reiterate that consistent PLS is a viable means to overcome this limitation. Finally, we study the performance of PLSF-SEM through scenario analyses. Based on our results, we conclude that PLSF-SEM is inferior to covariance-based structural equation modelling and consistent PLS in almost all respects. Therefore, we cannot currently recommend the use of PLSF-SEM, and it is up to future research to demonstrate potential advantages over existing structural equation modelling techniques.