In this information age, serious concerns with unethical behaviour in information technology (e.g., software piracy, deception, plagiarism, etc.) have cast doubts on the claims of the unmitigated success of rapid adoption of information... more
In this information age, serious concerns with unethical behaviour in information technology (e.g., software piracy, deception, plagiarism, etc.) have cast doubts on the claims of the unmitigated success of rapid adoption of information technology. Surprisingly, there have been very few studies in information systems (IS) that have tried to understand the general rise in such unethical behaviours with respect to information technology. Especially, the question that remains to be understood is: Are these problems of unethical behaviour representative of the human nature at large, or are they related to characteristics of technology in any way? This article tries to partly answer this question. It looks at dyadic communicative behaviour using technology-mediated communication and proposes a conceptual model of unethical communicative behaviour.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
IS research is increasingly interested in well-being-oriented impacts of information systems (IS). Compassion is an underlying prosocial behavior that arguably empowers such well-being-oriented IS impacts. The overall purpose of this... more
IS research is increasingly interested in well-being-oriented impacts of information systems (IS). Compassion is an underlying prosocial behavior that arguably empowers such well-being-oriented IS impacts. The overall purpose of this panel is to ask: Should IS research pursue research on compassion as a serious stream of inquiry? To address this core purpose, we raise two questions regarding the controversial roles of IS in a) raising suffering and b) facilitating versus hindering the expression of compassion. Our panel of junior, senior, and mid-career IS researchers take on positions for and against the core motion of including Compassion research in IS research as they argue each controversial question. We offer considerations/recommendations on issues salient to conducting and publishing IS-Compassion research. Audience participation is baked into the structure of the panel as an integral component. Our panel will appeal to a global IS audience interested in using IS research to impact positive change
Research Interests:
Given the growing concerns about unethical usage of Information Technology (IT) becoming a major security concern, this research-in-progress paper conceptually models IS practitioner (professional) attitude toward unethical IT use. Based... more
Given the growing concerns about unethical usage of Information Technology (IT) becoming a major security concern, this research-in-progress paper conceptually models IS practitioner (professional) attitude toward unethical IT use. Based on the ethical notions of universalism and particularism, it argues for a two-dimensional analysis to judge development of attitude toward using IT unethically: understand the IS professional as a human being subscribing to universal principles and understand the IS professional as rooted to an organizational community of practice. Through its articulation of two powerful lenses of universalism and particularism, this paper contributes by understanding how philosophical perspectives of ethics can inform our understanding of IS security. Finally, the paper discusses future research and practice implications arising out of this conceptual treatment
Research Interests: Marketing, Music, Social Media, Artists, Music Business, and 3 moreBrand Development, Musical, and Instagram
Research Interests:
rd
Research Interests:
The changes in the IT industry have diversified the role of an analyst. Analysts play an influential role in Information System Development (ISD) projects. Previous research indicates that the skill requirements of an analyst are both... more
The changes in the IT industry have diversified the role of an analyst. Analysts play an influential role in Information System Development (ISD) projects. Previous research indicates that the skill requirements of an analyst are both behavioral and knowledge based. Even though behavioral skills are critical, IS curriculum has typically focused on technological and domain knowledge skills. This research suggests an important focus of IS education should be at providing students with means to hone behavioral skills critical for systems analysts. The paper proposes that such interventions could be achieved in the form of behavioral module injection and demonstrates how such a module may be designed using existing theoretical perspectives from pedagogical research.
Research Interests:
Information Systems (IS) have become critical for healthcare organizations. However implementation and adoption of integrated healthcare IS continues to be a non-trivial task. This research suggests that insights into this phenomenon may... more
Information Systems (IS) have become critical for healthcare organizations. However implementation and adoption of integrated healthcare IS continues to be a non-trivial task. This research suggests that insights into this phenomenon may be achieved using theoretical perspectives related to boundary spanning amongst distinct fields of practice. It further argues that successful use of IS within a healthcare organization requires its IT-practice to act as the boundary-spanning agent for the diverse fields of practice. Using an interpretive case research approach the research examines the nature of the boundaryspanning role played by an organizational IT-practice in Saudi-Arabia. The primary conclusion of the investigation is that successful IS implementation and use requires the organization’s IT-practices to act as effective boundary-spanners. Further it is suggested that such boundary-spanning activities have different modes for development and the maintenance phases.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
We present a sociomaterial conception of organizational compassion. We are inspired by the emergence of the positive psychology literature in management as well as the paradigm of positive computing (http://www.positivecomputing.org/)... more
We present a sociomaterial conception of organizational compassion. We are inspired by the emergence of the positive psychology literature in management as well as the paradigm of positive computing (http://www.positivecomputing.org/) which aims to design and use IT for human well-being (Calvo and Peters 2014). Compassion is fundamental to supporting human well-being (Tsui 2013). From an IS perspective, organizational compassion is the phenomenon where social and technological elements of an organization synergistically combine with one another such that the organizational system collectively notices, feels, makes sense of, and responds to suffering experienced by that system’s internal and external stakeholders. We leverage the notions of affordances, imbrications, routines, and human agency within the critical realist view of sociomateriality (Leonardi 2011) to develop our conception (Figure 1 & Table 1). Through our sociomaterial formulation of organizational compassion, we hope ...
Research Interests:
I recently received a savage review of an article I co-wrote and submitted to a journal that referred to the submitted article as sounding like it was written by a "charlatan attorney" and that referred to parts of the article... more
I recently received a savage review of an article I co-wrote and submitted to a journal that referred to the submitted article as sounding like it was written by a "charlatan attorney" and that referred to parts of the article as "absurd" and as "gibberish." It compared the argumentation to that in "freshman-level term papers," and recommended that the author, who is "seriously out of his/her element with this topic … refrain from venturing into areas that exceed his/her professional competence." –Robert J. Sternberg Many scholars, ourselves among them, can relate to the opening quote. While many, if not most, reviews are politely composed with helpful suggestions, the reviews we tend to remember are the ones that hurt us, that seem to attack us, that feel as though they discredit not just the specific work but our professional competency. Rarely, one hopes, will that have been the reviewer's intention, but their words can be pai...
Research Interests:
This study examines relationships between the location of supply chain disruptions (SCDs) within the supply chain, a firm’s experience with SCDs, and the disruption severity. Using organisational l...
Research Interests:
Research Interests:
Research Interests:
Research Interests: Information Systems, Information Science, Information Technology, Management Information Systems, Information Management, and 15 moreHealth Information Systems, Case Studies, Management Science, Business Information Systems, Accounting Information Systems, Electronic Markets, Computer and Information Technology, Business and Management, Information Systems Management, Business Model, Information Management System, Information Systems Technology, Computer Information Systems, Geographic Information Systems, and Information System
Research Interests:
Research Interests:
Research Interests:
Abstract Scholars are increasingly calling for a deeper understanding of cyberharassment (CH) with the goal of devising policies, procedures, and technologies to mitigate it. Accordingly, we conducted CH research that (1) integrated... more
Abstract Scholars are increasingly calling for a deeper understanding of cyberharassment (CH) with the goal of devising policies, procedures, and technologies to mitigate it. Accordingly, we conducted CH research that (1) integrated social learning theory (SLT) and self-control theory (SCT); (2) empirically studied this model with two contrasting samples, experienced cyberharassers and less experienced cyberharassers; and (3) conducted post hoc tests to tease out the differences between the two samples. We show that for less experienced cyberharassers, CH is largely a social-psychological-technological phenomenon; whereas, for experienced cyberharassers, CH is primarily a psychological-technological phenomenon. Our study makes a threefold contribution: (1) it shows the value of integrating two theories in a holistic and parsimonious manner to explain CH; (2) it shows that SCT alone is a more relevant framework for experienced cyberharassers, whereas a combination of SCT and SLT better explains less experienced cyberharassers; and (3) it reveals that the role of technology in fostering CH is crucial, regardless of the sample. The differential, yet consistent, findings demonstrate that addressing CH is contingent upon not only identifying theoretical approaches but also identifying the particular samples to which these theoretical approaches will be more suitable. Of several implications for practice, the most important may be that anonymity, asynchronicity, and lack of monitoring are the technology choices that foster CH, and thus these should be mitigated in designing social media and other communication technologies
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT The widespread adoption of the Computers and Information Technology in every field has opened up immense possibilities for using Information Technology in an unethical manner. Cases of hacking, software piracy etc. have become... more
ABSTRACT The widespread adoption of the Computers and Information Technology in every field has opened up immense possibilities for using Information Technology in an unethical manner. Cases of hacking, software piracy etc. have become major concerns. However the IS literature is somewhat limited on this. Specifically, the factors leading to such behavior have not been generically studied in detail. The paper aims to fill this gap and tries to develop a model of unethical IT usage based on the underlying framework of the Theory of Reasoned Action (TRA). Drawing from research in IS, psychology, ethics and a little of Transaction Cost Economics, it adapts the TRA to the IS context and posits individual, social and technological factors as important in understanding unethical IT usage. This paper, currently research in progress, develops the model and includes propositions that can be developed into testable hypotheses for empirical work.
Research Interests:
With the modern day imperative of individuals being perennially on the move in order to keep pace with their work and business lives, the notion of "mobile collaboration" has come to assume a great deal of... more
With the modern day imperative of individuals being perennially on the move in order to keep pace with their work and business lives, the notion of "mobile collaboration" has come to assume a great deal of importance, both among scholars and practitioners. While the literature continues to extol the promises and virtues of mobility, there have been few illustrations on what collaboration means under conditions of mobility, and how it actually occurs. This paper takes a preliminary step toward clarifying the notion of mobile collaboration and developing a set of integrative themes capturing its essence.
Research Interests:
Research Interests:
Given the growing concerns about unethical usage of Information Technology (IT) becoming a major security concern, this research-in-progress paper conceptually models IS practitioner (professional) attitude toward unethical IT use. Based... more
Given the growing concerns about unethical usage of Information Technology (IT) becoming a major security concern, this research-in-progress paper conceptually models IS practitioner (professional) attitude toward unethical IT use. Based on the ethical notions of universalism and particularism, it argues for a two-dimensional analysis to judge development of attitude toward using IT unethically: understand the IS professional as a human
Research Interests:
Research Interests:
Research Interests: Ethics and Organizations
This paper discusses ICT innovation in India using a narrative framework. We argue that ICT innovation has not been a subject sufficiently researched in information systems from the perspective of innovation in developing countries. We... more
This paper discusses ICT innovation in India using a narrative framework. We argue that ICT innovation has not been a subject sufficiently researched in information systems from the perspective of innovation in developing countries. We use a grounded theory inspired approach. There are three narratives of innovation in India; a) the supply narrative, b) the technology narrative and c) the collaborative narrative. We trace the evolution of these narratives.
Research Interests:
ABSTRACT The widespread adoption of the Computers and Information Technology in every field has opened up immense possibilities for using Information Technology in an unethical manner. Cases of hacking, software piracy etc. have become... more
ABSTRACT The widespread adoption of the Computers and Information Technology in every field has opened up immense possibilities for using Information Technology in an unethical manner. Cases of hacking, software piracy etc. have become major concerns. However the IS literature is somewhat limited on this. Specifically, the factors leading to such behavior have not been generically studied in detail. The paper aims to fill this gap and tries to develop a model of unethical IT usage based on the underlying framework of the Theory of Reasoned Action (TRA). Drawing from research in IS, psychology, ethics and a little of Transaction Cost Economics, it adapts the TRA to the IS context and posits individual, social and technological factors as important in understanding unethical IT usage. This paper, currently research in progress, develops the model and includes propositions that can be developed into testable hypotheses for empirical work.