AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & IoT SME & IT Management Platform Ecosystems & Strategy Cybersecurity & Risk AI Applications & Technologies Healthcare & Well-being Digital Work & Collaboration
Smart Bins: Case study-based benefit evaluation of filling level sensors in smart waste containers
HMD Praxis der Wirtschaftsinformatik (2021)

Smart Bins: Case study-based benefit evaluation of filling level sensors in smart waste containers

David Hoffmann, Ruben Franz, Florian Hawlitschek, Nico Jahn
This study evaluates the potential benefits of using filling level sensors in waste containers, transforming them into "smart bins" for more efficient waste management. Through a multiple case study with three German waste management companies, the paper explores the practical application of different sensor technologies to identify key challenges, provide recommendations for pilot projects, and outline requirements for future development.

Problem Traditional waste management relies on emptying containers at fixed intervals, regardless of how full they are. This practice is inefficient, leading to unnecessary costs and emissions from premature collections or overflowing bins and littering from late collections. Furthermore, existing research on smart bin technology is fragmented and often limited to simulations, lacking practical insights from real-world deployments.

Outcome - Pilot studies revealed significant optimization potential, with analyses showing that some containers were only 50% full at their scheduled collection time.
- The implementation of sensor technology requires substantial effort in planning, installation, calibration, and maintenance, including the need for manual data collection to train algorithms.
- Fill-level sensors are not precision instruments and are prone to outliers, but they are sufficiently accurate for waste management when used to classify fill levels into broad categories (e.g., quartiles).
- Different sensor types are suitable for different waste materials; for example, vibration-based sensors proved 94.5% accurate for paper and cardboard, which can expand after being discarded.
- Major challenges include the lack of technical standards for sensor installation and data interfaces, as well as the difficulty of integrating proprietary sensor platforms with existing logistics and IT systems.
Waste management, Smart bins, Filling level measurement, Sensor technology, Internet of Things
Beyond the office: an examination of remote work, social and job features on individual satisfaction and engagement
Personnel Review (2024)

Beyond the office: an examination of remote work, social and job features on individual satisfaction and engagement

Rossella Cappetta, Sara Lo Cascio, Massimo Magni, Alessia Marsico
This study examines the effects of remote work on employees' satisfaction and engagement, aiming to identify which factors enhance these outcomes. The research is based on a survey of 1,879 employees and 262 managers within a large company that utilizes a hybrid work model.

Problem The rapid and widespread adoption of remote work has fundamentally transformed work environments and disrupted traditional workplace dynamics. However, its effects on individual employees remain inconclusive, with conflicting evidence on whether it is a source of support or discomfort, creating a need to understand the key drivers of satisfaction and engagement in this new context.

Outcome - Remote work frequency is negatively associated with employee engagement and has no significant effect on job satisfaction.
- Positive social features, such as supportive team and leader relationships, significantly increase both job satisfaction and engagement.
- Job features like autonomy were found to be significant positive drivers for employees, but not for managers.
- A high-quality relationship between a leader and an employee (leader-member exchange) can alleviate the negative effects of exhaustion on satisfaction and engagement.
Remote work, Social exchanges, Job characteristics, Job satisfaction, Engagement
Building Habits in the Digital Age: Incorporating Psychological Needs and Knowledge from Practitioners to Inform the Design of Digital Therapeutics
International Conference on Wirtschaftsinformatik (2023)

Building Habits in the Digital Age: Incorporating Psychological Needs and Knowledge from Practitioners to Inform the Design of Digital Therapeutics

Jeannette Stark, Thure Weimann, Felix Reinsch, Emily Hickmann, Maren Kählig, Carola Gißke, and Peggy Richter
This study reviews the psychological requirements for forming habits and analyzes how these requirements are implemented in existing mobile habit-tracking apps. Through a content analysis of 57 applications, the research identifies key design gaps and proposes a set of principles to inform the creation of more effective Digital Therapeutics (DTx) for long-term behavioral change.

Problem Noncommunicable diseases (NCDs), a leading cause of death, often require sustained lifestyle and behavioral changes. While many digital apps aim to support habit formation, they often fail to facilitate the entire process, particularly the later stages where a habit becomes automatic and reliance on technology should decrease, creating a gap in effective long-term support.

Outcome - Conventional habit apps primarily support the first two stages of habit formation: deciding on a habit and translating it into an initial behavior.
- Most apps neglect the crucial later stages of habit strengthening, where technology use should be phased out to allow the habit to become truly automatic.
- A conflict of interest was identified, as the commercial need for continuous user engagement in many apps contradicts the goal of making a user's new habit independent of the technology.
- The research proposes specific design principles for Digital Therapeutics (DTx) to better support all four stages of habit formation, offering a pathway for developing more effective tools for NCD prevention and treatment.
Behavioral Change, Digital Therapeutics, Habits, Habit Apps, Non-communicable diseases
Uncovering the Structural Assurance Mechanisms in Blockchain Technology-Enabled Online Healthcare Mutual Aid Platforms
Journal of the Association for Information Systems (2025)

Uncovering the Structural Assurance Mechanisms in Blockchain Technology-Enabled Online Healthcare Mutual Aid Platforms

Zhen Shao, Lin Zhang, Susan A. Brown, Jose Benitez
This study investigates how to build user trust in online healthcare mutual aid platforms that use blockchain technology. Drawing on institutional trust theory, the research examines how policy and technology assurances influence users' intentions and actual usage by conducting a two-part field survey with users of a real-world platform.

Problem Online healthcare mutual aid platforms, which act as a form of peer-to-peer insurance, struggle with user adoption due to widespread distrust. Frequent incidents of fraud, false claims, and misappropriation of funds have created skepticism, making it a significant challenge to facilitate user trust and ensure the sustainable growth of these platforms.

Outcome - Both strong institutional policies (policy assurance) and reliable technical features enabled by blockchain (technology assurance) significantly increase users' trust in the platform.
- Higher user trust is directly linked to a greater intention to use the online healthcare mutual aid platform.
- The intention to use the platform positively influences actual usage behaviors, such as the frequency and intensity of use.
- Trust acts as a full mediator, meaning that the platform's assurances build trust, which in turn drives user intention and behavior.
Structural Assurance, Blockchain Technology, Healthcare, Trust, Behavioral Intention, Actual Usage Behaviors
Responsible AI Design: The Authenticity, Control, Transparency Theory
Journal of the Association for Information Systems (2025)

Responsible AI Design: The Authenticity, Control, Transparency Theory

Andrea Rivera, Kaveh Abhari, Bo Xiao
This study explores how to design Artificial Intelligence (AI) responsibly from the perspective of AI designers. Using a grounded theory approach based on interviews with industry professionals, the paper develops the Authenticity, Control, Transparency (ACT) theory as a new framework for creating ethical AI.

Problem Current guidelines for responsible AI are fragmented and lack a cohesive theory to guide practice, leading to inconsistent outcomes. Existing research often focuses narrowly on specific attributes like algorithms or harm minimization, overlooking the broader design decisions that shape an AI's behavior from its inception.

Outcome - The study introduces the Authenticity, Control, and Transparency (ACT) theory as a practical framework for responsible AI design.
- It identifies three core mechanisms—authenticity, control, and transparency—that translate ethical design decisions into responsible AI behavior.
- These mechanisms are applied across three key design domains: the AI's architecture, its algorithms, and its functional affordances (capabilities offered to users).
- The theory shifts the focus from merely minimizing harm to also maximizing the benefits of AI, providing a more balanced approach to ethical design.
Responsible AI, AI Ethics, AI Design, Authenticity, Transparency, Control, Algorithmic Accountability
An Organizational Routines Theory of Employee Well-Being: Explaining the Love-Hate Relationship Between Electronic Health Records and Clinicians
Journal of the Association for Information Systems (2025)

An Organizational Routines Theory of Employee Well-Being: Explaining the Love-Hate Relationship Between Electronic Health Records and Clinicians

Ankita Srivastava, Surya Ayyalasomayajula, Chenzhang Bao, Sezgin Ayabakan, Dursun Delen
This study investigates the causes of clinician burnout by analyzing over 55,000 online reviews from clinicians on Glassdoor.com. Using topic mining and econometric modeling, the research proposes and tests a new theory on how integrating various Electronic Health Record (EHR) applications to streamline organizational routines affects employee well-being.

Problem Clinician burnout is a critical problem in healthcare, often attributed to the use of Electronic Health Records (EHRs). However, the precise reasons for this contentious relationship are not well understood, and there is a research gap in explaining how organizational-level IT decisions, such as how different systems are integrated, contribute to clinician stress or satisfaction.

Outcome - Routine operational issues, such as workflow and staffing, were more frequently discussed by clinicians as sources of dissatisfaction than EHR-specific factors like usability.
- Integrating applications to streamline clinical workflows across departments (e.g., emergency, lab, radiology) significantly improved clinician well-being.
- In contrast, integrating applications focused solely on documentation did not show a significant impact on clinician well-being.
- The positive impact of workflow integration was stronger in hospitals with good work-life balance policies and weaker in hospitals with high patient-to-nurse ratios, highlighting the importance of organizational context.
Clinician Burnout, Organizational Routines Theory, Application Integration Theory, Technostress Theory, Well-Being, Glassdoor, Online Reviews
Sunk Cost Fallacy, Price Adjustment, and Subscription Services for Information Goods
Journal of the Association for Information Systems (2025)

Sunk Cost Fallacy, Price Adjustment, and Subscription Services for Information Goods

Mingyue Zhang, Jesse Bockstedt, Tingting Song, Xuan Wei
This study investigates how adjusting the upfront subscription price for information goods, like a movie service, influences customer consumption behavior. Using a quasi-natural experiment involving a movie subscription service's sudden price drop and a follow-up randomized experiment, the research analyzes the impact on movie-watching habits through the lens of the sunk cost fallacy.

Problem Subscription services often adjust their pricing, but it remains unclear how changes in the fixed upfront fee—a sunk cost for the consumer—affect subsequent consumption. While traditional economic theory suggests sunk costs should be ignored, behavioral economics indicates people often try to 'get their money's worth'. This study addresses this gap by examining how a significant price reduction impacts user consumption and whether it's a profitable strategy for providers.

Outcome - A sharp downward price adjustment of a movie subscription fee increased box office revenues for an average movie by 12% to 35% in the following six months.
- The price drop primarily attracted highly price-conscious consumers who are more susceptible to the sunk cost fallacy, leading them to increase their consumption to justify the initial fee.
- Niche information goods, particularly those with high quality and narrow appeal, benefited the most from the price adjustment strategy.
- The impact of the price change on consumption decreases over time, a phenomenon known as 'payment depreciation,' as consumers gradually adapt to the initial cost.
Subscription Service, Sunk Cost, Price Adjustment, Quasi-Natural Experiment, Niche Information Goods, Consumer Behavior
Continuous Contracting in Software Outsourcing: Towards A Configurational Theory
Journal of the Association for Information Systems (2025)

Continuous Contracting in Software Outsourcing: Towards A Configurational Theory

Thomas Huber, Kalle Lyytinen
This study investigates how governance configurations are formed, evolve, and influence outcomes in software outsourcing projects that use continuous contracting. Through a longitudinal, multimethod analysis of 33 governance episodes across three projects, the research identifies how different combinations of contract design and project control achieve alignment and flexibility. The methodology combines thematic analysis with crisp-set qualitative comparative analysis (csQCA) to develop a new theory.

Problem Contemporary software outsourcing increasingly relies on continuous contracting, where an initial umbrella agreement is followed by periodic contracts. However, there is a significant gap in understanding how managers should combine contract design and project controls to balance the competing needs for project alignment and operational flexibility, and how these choices evolve to impact overall project performance.

Outcome - Identified eight distinct governance configurations, each consistently linked to specific outcomes of alignment and flexibility.
- Found that project outcomes depend on how governance elements interact within a configuration, either by substituting for each other or compensating for each other's limitations.
- Showed that as trust and knowledge accumulate, managers' governance strategies evolve from simple configurations (achieving either alignment or flexibility) to more sophisticated ones that achieve both simultaneously.
- Concluded that by deliberately evolving governance configurations, managers can better steer projects and enhance overall performance.
Software Outsourcing Governance, Contract Design, Project Control, Continuous Contracting, Alignment, Flexibility, Governance Configurations
Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir)responsibility and Information Security Performance
Journal of the Association for Information Systems (2025)

Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir)responsibility and Information Security Performance

Qian Wang, Dan Pienta, Shenyang Jiang, Eric W. T. Ngai, Jason Bennett Thatcher
This study investigates the relationship between a company's social performance toward its employees and its information security outcomes. Using an eight-year analysis of publicly listed firms and a scenario-based experiment, the research examines how both positive actions (employee-related Corporate Social Responsibility) and negative actions (employee-related Corporate Social Irresponsibility) affect a firm's security risks.

Problem Information security breaches are frequently caused by human error, which often stems from a misalignment between employee goals and a firm's security objectives. This study addresses the gap in human-centric security strategies by exploring whether improving employee well-being and social treatment can align these conflicting interests, thereby reducing security vulnerabilities and data breaches.

Outcome - A firm's engagement in positive, employee-related corporate social responsibility (CSR) is associated with reduced information security risks.
- Conversely, a firm's involvement in socially irresponsible activities toward employees (CSiR) is positively linked to an increase in security risks.
- The impact of these positive and negative actions on security is amplified when the actions are unique compared to industry peers.
- Experimental evidence confirmed that these effects are driven by changes in employees' security commitment, willingness to monitor peers for security compliance, and overall loyalty to the firm.
Information Security, Data Breach, Employee-Related Social Performance, Corporate Social Responsibility, Agency Theory, Cybersecurity Risk
What Is Augmented? A Metanarrative Review of AI-Based Augmentation
Journal of the Association for Information Systems (2025)

What Is Augmented? A Metanarrative Review of AI-Based Augmentation

Inès Baer, Lauren Waardenburg, Marleen Huysman
This paper conducts a comprehensive literature review across five research disciplines to clarify the concept of AI-based augmentation. Using a metanarrative review method, the study identifies and analyzes four distinct targets of what AI augments: the body, cognition, work, and performance. Based on this framework, the authors propose an agenda for future research in the field of Information Systems.

Problem In both academic and public discussions, Artificial Intelligence is often described as a tool for 'augmentation' that helps humans rather than replacing them. However, this popular term lacks a clear, agreed-upon definition, and there is little discussion about what specific aspects of human activity are the targets of this augmentation. This research addresses the fundamental question: 'What is augmented by AI?'

Outcome - The study identified four distinct metanarratives, or targets, of AI-based augmentation: the body (enhancing physical and sensory functions), cognition (improving decision-making and knowledge), work (creating new employment opportunities and improving work practices), and performance (increasing productivity and innovation).
- Each augmentation target is underpinned by a unique human-AI configuration, ranging from human-AI symbiosis for body augmentation to mutual learning loops for cognitive augmentation.
- The paper reveals tensions and counternarratives for each target, showing that augmentation is not purely positive; for example, it can lead to over-dependence on AI, deskilling, or a loss of human agency.
- The four augmentation targets are interconnected, creating potential conflicts (e.g., prioritizing performance over meaningful work) or dependencies (e.g., cognitive augmentation relies on augmenting bodily senses).
Augmentation, Artificial Intelligence, Human-AI Interaction, Metanarrative Review, Cognitive Augmentation, Work Augmentation, Organizational Performance
Corporate Nomads: Working at the Boundary Between Corporate Work and Digital Nomadism
Journal of the Association for Information Systems (2025)

Corporate Nomads: Working at the Boundary Between Corporate Work and Digital Nomadism

Julian Marx, Milad Mirbabaie, Stefan Stieglitz
This study explores the emerging phenomenon of 'corporate nomads'—individuals who maintain permanent employment while adopting a nomadic, travel-based lifestyle. Through qualitative interviews with 37 corporate nomads, the research develops a process model to understand how these employees and their organizations negotiate the boundaries between traditional corporate structures and the flexibility of digital nomadism.

Problem Highly skilled knowledge workers increasingly desire the flexibility of a nomadic lifestyle, a concept traditionally seen as incompatible with permanent corporate employment. This creates a tension for organizations that need to attract and retain top talent but are built on location-dependent work models, leading to a professional paradox for employees wanting both stability and freedom.

Outcome - The study develops a three-phase process model (splintering, calibrating, and harmonizing) that explains how corporate nomads and their organizations successfully negotiate this new work arrangement.
- The integration of corporate nomads is not a one-sided decision but a mutual process of 'boundary work' requiring engagement, negotiation, and trade-offs from both the employee and the company.
- Corporate nomads operate as individual outliers who change their personal work boundaries (e.g., location and time) without transforming the entire organization's structure.
- Information Technology (IT) is crucial in managing the inherent tensions of this lifestyle, helping to balance organizational control with employee autonomy and enabling integration from a distance.
Corporate Nomads, Digital Nomads, Boundary Work, Digital Work, Information Systems
Capturing the “Social” in Social Networks: The Conceptualization and Empirical Application of Relational Quality
Journal of the Association for Information Systems (2025)

Capturing the “Social” in Social Networks: The Conceptualization and Empirical Application of Relational Quality

Christian Meske, Iris Junglas, Matthias Trier, Johannes Schneider, Roope Jaakonmäki, Jan vom Brocke
This study introduces and validates a concept called "relational quality" to better understand the social dynamics within online networks beyond just connection counts. By analyzing over 440,000 messages from two large corporate social networks, the researchers developed four measurable markers—being personal, curious, respectful, and sharing—to capture the richness of online relationships.

Problem Traditional analysis of social networks focuses heavily on structural aspects, such as who is connected to whom, but often overlooks the actual quality and nature of the interactions. This creates a research gap where the 'social' element of social networks is not fully understood, limiting our ability to see how online relationships create value. This study addresses this by developing a framework to conceptualize and measure the quality of these digital social interactions.

Outcome - Relational quality is a distinct and relevant dimension that complements traditional structural social network analysis (SNA), which typically only focuses on network structure.
- The study identifies and measures four key facets of relational quality: being personal, being curious, being polite, and sharing.
- Different types of users exhibit distinct patterns of relational quality; for instance, 'connectors' (users with many connections but low activity) are the most personal, while 'broadcasters' (users with high activity but few connections) share the most resources.
- As a user's activity (e.g., number of posts) increases, their interactions tend to become less personal, curious, and polite, while their sharing of resources increases.
- In contrast, as a user's number of connections grows, their interactions become more personal and curious, but they tend to share fewer resources.
Enterprise Social Network, Social Capital, Relational Quality, Social Network Analysis, Linguistic Analysis, Computational Research
What Goals Drive Employees' Information Systems Security Behaviors? A Mixed Methods Study of Employees' Goals in the Workplace
Journal of the Association for Information Systems (2025)

What Goals Drive Employees' Information Systems Security Behaviors? A Mixed Methods Study of Employees' Goals in the Workplace

Sebastian Schuetz, Heiko Gewald, Allen Johnston, Jason Bennett Thatcher
This study investigates the work-related goals that motivate employees' information systems security behaviors. It employs a mixed-methods approach, first using qualitative interviews to identify key employee goals and then using a large-scale quantitative survey to evaluate their importance in predicting security actions.

Problem Prior research on information security behavior often relies on general theories from criminology or public health, which do not fully capture the specific goals employees have in a workplace context. This creates a gap in understanding the primary motivations for why employees choose to follow or ignore security protocols during their daily work.

Outcome - Employees' security behaviors are primarily driven by the goals of achieving good work performance and avoiding blame for security incidents.
- Career advancement acts as a higher-order goal, giving purpose to security behaviors by motivating the pursuit of subgoals like work performance and blame avoidance.
- The belief that security behaviors help meet a supervisor's performance expectations (work performance alignment) is the single most important predictor of those behaviors.
- Organizational citizenship (the desire to be a 'good employee') was not a significant predictor of security behavior when other goals were considered.
- A strong security culture encourages secure behaviors by strengthening the link between these behaviors and the goals of work performance and blame avoidance.
Security Behaviors, Goal Systems Theory (GST), Work Performance, Blame Avoidance, Organizational Citizenship, Career Advancement
Technocognitive Structuration: Modeling the Role of Cognitive Structures in Technology Adaptation
Journal of the Association for Information Systems (2025)

Technocognitive Structuration: Modeling the Role of Cognitive Structures in Technology Adaptation

Rob Gleasure, Kieran Conboy, Qiqi Jiang
This study investigates how individuals' thought processes change when they adapt to using technology. The researchers propose and test a theory called 'technocognitive structuration', which posits that these mental changes (cognitive adaptations) are a crucial middle step that links changes in technology use to changes in task performance. The theory was tested through an online experiment where participants had to adapt their use of word processing software for a specific task.

Problem Existing theories often explain how people adapt to technology by focusing on social and behavioral factors, but they largely ignore how these adaptations change our internal mental models. This is a significant gap in understanding, as modern digital tools like AI, social media, and wearables are known to influence how we process information and conceptualize problems. The study addresses this by creating a model that explicitly includes these cognitive changes to provide a more complete picture of technology adaptation.

Outcome - The study's results confirmed that cognitive adaptation is a critical mediator between technology adaptation and task adaptation. In other words, changing how one thinks about a technology is a key step in translating new feature use into new ways of performing tasks.
- Two types of cognitive changes were identified: exploitative adaptations (refining existing mental models) and exploratory adaptations (creating fundamentally new mental models), both of which were found to be significant.
- These findings challenge existing research by suggesting that cognitive adaptation is not just a side effect but an essential mechanism to consider when explaining how and why people change their work practices in response to new technology.
Technocognitive Structuration, Technology Adaptation, Cognitive Structures, Adaptive Structuration Theory for Individuals, Structuration, Experiment
Making Sense of Discursive Formations and Program Shifts in Large-Scale Digital Infrastructures
Journal of the Association for Information Systems (2025)

Making Sense of Discursive Formations and Program Shifts in Large-Scale Digital Infrastructures

Egil Øvrelid, Bendik Bygstad, Ole Hanseth
This study examines how public and professional discussions, known as discourses, shape major changes in large-scale digital systems like national e-health infrastructures. Using an 18-year in-depth case study of Norway's e-health development, the research analyzes how high-level strategic trends interact with on-the-ground practical challenges to drive fundamental shifts in technology programs.

Problem Implementing complex digital infrastructures like national e-health systems is notoriously difficult, and leaders often struggle to understand why some initiatives succeed while others fail. Previous research focused heavily on the role of powerful individuals or groups, paying less attention to the underlying, systemic influence of how different conversations about technology and strategy converge over time. This gap makes it difficult for policymakers to make sensible, long-term decisions and navigate the evolution of these critical systems.

Outcome - Major shifts in large digital infrastructure programs occur when high-level strategic discussions (macrodiscourses) and practical, operational-level discussions (microdiscourses) align and converge.
- This convergence happens through three distinct processes: 'connection' (a shared recognition of a problem), 'matching' (evaluating potential solutions that fit both high-level goals and practical needs), and 'merging' (making a decision and reconciling the different perspectives).
- The result of this convergence is a new "discursive formation"—a powerful, shared understanding that aligns stakeholders, technology, and strategy, effectively launching a new program and direction.
- Policymakers and managers can use this framework to better analyze the alignment between broad technological trends and their organization's specific, internal needs, leading to more informed and realistic strategic planning.
Discursive Formations, Discourse Convergence, Large-Scale Digital Infrastructures, E-Health Programs, Program Shifts, Sociotechnical Systems, IT Strategy
Toward Triadic Delegation: How Agentic IS Artifacts Affect the Patient-Doctor Relationship in Healthcare
Journal of the Association for Information Systems (2025)

Toward Triadic Delegation: How Agentic IS Artifacts Affect the Patient-Doctor Relationship in Healthcare

Pascal Fechner, Luis Lämmermann, Jannik Lockl, Maximilian Röglinger, Nils Urbach
This study investigates how autonomous information systems (agentic IS artifacts) are transforming the traditional two-way relationship between patients and doctors into a three-way, or triadic, relationship. Using an in-depth case study of an AI-powered health companion for managing neurogenic lower urinary tract dysfunction, the paper analyzes the new dynamics, roles, and interactions that emerge when an intelligent technology becomes an active participant in healthcare delivery.

Problem With the rise of artificial intelligence in medicine, autonomous systems are no longer just passive tools but active agents in patient care. This shift challenges the conventional patient-doctor dynamic, yet existing theories are ill-equipped to explain the complexities of this new three-part relationship. This research addresses the gap in understanding how these AI agents redefine roles, interactions, and potential conflicts in patient-centric healthcare.

Outcome - The introduction of an AI agent transforms the dyadic patient-doctor relationship into a triadic one, often with the AI acting as a central intermediary.
- The AI's capabilities create 'attribute interference,' where responsibilities and knowledge overlap between the patient, doctor, and AI, introducing new complexities.
- New 'triadic delegation choices' emerge, allowing tasks to be delegated to the doctor, the AI, or both, based on factors like task complexity and emotional context.
- The study identifies novel conflicts arising from this triad, including human concerns over losing control (autonomy conflicts), new information imbalances, and the blurring of traditional medical roles.
Agentic IS Artifacts, Delegation, Patient-Doctor Relationship, Personalized Healthcare, Triadic Delegation, Healthcare AI
Digital Infrastructure Development Through Digital Infrastructuring Work: An Institutional Work Perspective
Journal of the Association for Information Systems (2025)

Digital Infrastructure Development Through Digital Infrastructuring Work: An Institutional Work Perspective

Adrian Yeow, Wee-Kiat Lim, Samer Faraj
This paper investigates the complexities of developing large-scale digital infrastructure through a case study of an electronic medical record (EMR) system implementation in a U.S. hospital. It introduces and analyzes the concept of 'digital infrastructuring work'—the combination of technical, social, and symbolic actions that organizational actors perform. The study provides a framework for understanding the tensions and actions that shape the outcomes of such projects.

Problem Implementing new digital infrastructures in large organizations is challenging because it often disrupts established routines and power structures, leading to resistance and project stalls. Existing research frequently overlooks how the combination of technical tasks, social negotiations, and symbolic arguments by different groups influences the success or failure of these projects. This study addresses this gap by providing a more holistic view of the work involved in digital infrastructure development from an institutional perspective.

Outcome - The study introduces 'digital infrastructuring work' to explain how actors shape digital infrastructure development, categorizing it into three forms: digital object work (technical tasks), DI relational work (social interactions), and DI symbolic work (discursive actions).
- It finds that project stakeholders strategically combine these forms of work to either support change or maintain existing systems, highlighting the contested nature of infrastructure projects.
- The success or failure of a digital infrastructure project is shown to depend on how effectively different groups navigate the tensions between change and stability by skillfully blending technical, relational, and symbolic efforts.
- The paper demonstrates that technical work itself carries institutional significance and is not merely a neutral backdrop for social interactions, but a key site of contestation.
Digital Infrastructure Development, Institutional Work, IT Infrastructure Management, Healthcare Information Systems, Digital Objects, Case Study
Unpacking Board-Level IT Competency
Communications of the Association for Information Systems (2025)

Unpacking Board-Level IT Competency

Jennifer Jewer, Kenneth N. McKay
This study investigates how to best measure IT competency on corporate boards of directors. Using a survey of 75 directors in Sri Lanka, the research compares the effectiveness of indirect 'proxy' measures (like prior work experience) against 'direct' measures (assessing specific IT knowledge and governance practices) in reflecting true board IT competency and its impact on IT governance.

Problem Many companies struggle with poor IT governance, which is often blamed on a lack of IT competency at the board level. However, there is no clear consensus on what constitutes board IT competency or how to measure it effectively. Previous research has relied on various proxy measures, leading to inconsistent findings and uncertainty about how boards can genuinely improve their IT oversight.

Outcome - Direct measures of IT competency are more accurate and reliable indicators than indirect proxy measures.
- Boards with higher directly-measured IT competency demonstrate stronger IT governance.
- Among proxy measures, having directors with work experience in IT roles or management is more strongly associated with good IT governance than having directors with formal IT training.
- The study validates a direct measurement approach that boards can use to assess their competency gaps and take targeted steps to improve their IT governance capabilities.
Board of Directors, Board IT Competency, IT Governance, Proxy Measures, Direct Measures, Corporate Governance
Load More Showing 18 of 246