Smart Bins: Case study-based benefit evaluation of filling level sensors in smart waste containers
David Hoffmann, Ruben Franz, Florian Hawlitschek, Nico Jahn
This study evaluates the potential benefits of using filling level sensors in waste containers, transforming them into "smart bins" for more efficient waste management. Through a multiple case study with three German waste management companies, the paper explores the practical application of different sensor technologies to identify key challenges, provide recommendations for pilot projects, and outline requirements for future development.
Problem
Traditional waste management relies on emptying containers at fixed intervals, regardless of how full they are. This practice is inefficient, leading to unnecessary costs and emissions from premature collections or overflowing bins and littering from late collections. Furthermore, existing research on smart bin technology is fragmented and often limited to simulations, lacking practical insights from real-world deployments.
Outcome
- Pilot studies revealed significant optimization potential, with analyses showing that some containers were only 50% full at their scheduled collection time. - The implementation of sensor technology requires substantial effort in planning, installation, calibration, and maintenance, including the need for manual data collection to train algorithms. - Fill-level sensors are not precision instruments and are prone to outliers, but they are sufficiently accurate for waste management when used to classify fill levels into broad categories (e.g., quartiles). - Different sensor types are suitable for different waste materials; for example, vibration-based sensors proved 94.5% accurate for paper and cardboard, which can expand after being discarded. - Major challenges include the lack of technical standards for sensor installation and data interfaces, as well as the difficulty of integrating proprietary sensor platforms with existing logistics and IT systems.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we’re digging into a topic that affects every city and nearly every business: waste management. We've all seen overflowing public trash cans or collection trucks emptying bins that are practically empty. Host: We're looking at a fascinating study titled "Smart Bins: Case study-based benefit evaluation of filling level sensors in smart waste containers". Host: It explores how turning regular bins into "smart bins" with sensors can make waste management much more efficient. To help us understand the details, we have our expert analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Great to be here, Anna. Host: Alex, let's start with the big picture. What is the fundamental problem with the way we've traditionally handled waste collection? Expert: The core problem is inefficiency. Most waste management operates on fixed schedules. A truck comes every Tuesday, for example, regardless of whether a bin is 10% full or 110% full and overflowing. Host: And that creates two different problems, I imagine. Expert: Exactly. If the truck collects a half-empty bin, you've wasted fuel, labor costs, and created unnecessary emissions. If it's collected too late, you get overflowing containers, which leads to littering and public health concerns. The study points out that much of the existing research on this was based on simulations, not real-world data. Host: So this study took a more hands-on approach. How did the researchers actually test this technology? Expert: They conducted practical pilot projects with three different waste management companies in Germany. They installed various types of sensors in a range of containers—from public litter bins to large depot containers for glass and paper—to see how they performed in the real world. Host: A real-world stress test. So, what were the most significant findings? Was there real potential for optimization? Expert: The potential is massive. The analysis from one pilot showed that some containers were only 50% full at their scheduled collection time. That's a huge window for efficiency gains. Host: That's a significant number. But I'm guessing it's not as simple as just plugging in a sensor and saving money. Expert: You're right. A key finding was that the implementation requires substantial effort. We're talking about the whole lifecycle: planning, physical installation, and importantly, calibration. To make the sensors accurate, they had to manually collect data on fill levels to train the system's algorithms. Host: That's a hidden cost for sure. How reliable is the sensor data itself? Expert: That was another critical insight. These fill-level sensors are not precision instruments. They can have outliers, for instance, if a piece of trash lands directly on the sensor. Host: So they're not perfectly accurate? Expert: They don't have to be. The study found they are more than accurate enough for waste management if you reframe the goal. You don't need to know if a bin is 71% full versus 72%. You just need to classify it into broad categories, like quartiles—empty, 25%, 50%, 75%, or full. That's enough to make a smart collection decision. Host: That makes a lot of sense. Did they find that certain sensors work better for certain types of waste? Expert: Absolutely. This was one of the most interesting findings. For paper and cardboard, which can often expand after being discarded, a standard ultrasonic sensor might get a false reading. The study found that vibration-based sensors, which detect the vibrations of new waste being thrown in, proved to be 94.5% accurate for those materials. Host: Fascinating. So let's get to the most important part for our audience: why does this matter for business? What are the key takeaways? Expert: The primary takeaway is the move from static to dynamic logistics. Instead of a fixed route, a company can generate an optimized collection route each day based only on the bins that are actually full. This directly translates to savings in fuel, vehicle maintenance, and staff hours, while also reducing a company's carbon footprint. Host: The return on investment seems clear. But what are the major challenges a business leader should be aware of before diving in? Expert: The study highlights two major hurdles. The first is integration. Many sensor providers offer their own proprietary software platforms. Getting this new data to integrate smoothly with a company's existing logistics and IT systems is a significant technical challenge. Expert: The second hurdle is the lack of industry standards. There are no common rules for how sensors should be installed or what format the data should be in. This complicates deployment, especially at a large scale. Host: So it's powerful technology, but the ecosystem around it is still maturing. Expert: Precisely. The takeaway for businesses is to view this not as a simple plug-and-play device, but as a strategic logistics project. It requires upfront investment in planning and calibration, but the potential for long-term efficiency and sustainability gains is enormous. Host: A perfect summary. So, to recap: Traditional waste collection is inefficient. Smart bins with sensors offer a powerful way to optimize routes, saving money and reducing emissions. However, businesses must be prepared for significant implementation challenges, especially around calibrating the system and integrating it with existing software. Host: Alex, thank you so much for breaking that down for us. Expert: My pleasure, Anna. Host: And thank you for listening to A.I.S. Insights — powered by Living Knowledge. Join us next time as we decode another key study for your business.
Waste management, Smart bins, Filling level measurement, Sensor technology, Internet of Things
International Conference on Wirtschaftsinformatik (2023)
Building Habits in the Digital Age: Incorporating Psychological Needs and Knowledge from Practitioners to Inform the Design of Digital Therapeutics
Jeannette Stark, Thure Weimann, Felix Reinsch, Emily Hickmann, Maren Kählig, Carola Gißke, and Peggy Richter
This study reviews the psychological requirements for forming habits and analyzes how these requirements are implemented in existing mobile habit-tracking apps. Through a content analysis of 57 applications, the research identifies key design gaps and proposes a set of principles to inform the creation of more effective Digital Therapeutics (DTx) for long-term behavioral change.
Problem
Noncommunicable diseases (NCDs), a leading cause of death, often require sustained lifestyle and behavioral changes. While many digital apps aim to support habit formation, they often fail to facilitate the entire process, particularly the later stages where a habit becomes automatic and reliance on technology should decrease, creating a gap in effective long-term support.
Outcome
- Conventional habit apps primarily support the first two stages of habit formation: deciding on a habit and translating it into an initial behavior. - Most apps neglect the crucial later stages of habit strengthening, where technology use should be phased out to allow the habit to become truly automatic. - A conflict of interest was identified, as the commercial need for continuous user engagement in many apps contradicts the goal of making a user's new habit independent of the technology. - The research proposes specific design principles for Digital Therapeutics (DTx) to better support all four stages of habit formation, offering a pathway for developing more effective tools for NCD prevention and treatment.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge, the podcast where we translate complex research into actionable business strategy. I'm your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating study titled "Building Habits in the Digital Age: Incorporating Psychological Needs and Knowledge from Practitioners to Inform the Design of Digital Therapeutics". Host: With me is our expert analyst, Alex Ian Sutherland. Alex, in a nutshell, what is this study about? Expert: Hi Anna. This study looks at the psychology behind how we form habits and then analyzes how well current mobile habit-tracking apps actually support that process. It identifies some major design gaps and proposes a new set of principles for creating more effective health apps, known as Digital Therapeutics. Host: Let's start with the big picture problem. Why is building better habits so critical? Expert: It's a huge issue. The study highlights that noncommunicable diseases like diabetes and heart disease are the leading cause of death worldwide, and many are directly linked to our daily lifestyle choices. Host: So things like diet and exercise. And we have countless apps that promise to help us with that. Expert: We do, and that's the core of the problem this study addresses. While thousands of apps aim to help us build good habits, they often fail to support the entire journey. They're good at getting you started, but they don't help you finish. Host: What do you mean by "finish"? Isn't habit formation an ongoing thing? Expert: It is, but the end goal is for the new behavior to become automatic—something you do without thinking. The study finds that current apps often fail in those crucial later stages, where your reliance on technology should actually decrease, not increase. Host: That’s a really interesting point. How did the researchers go about studying this? Expert: Their approach was very methodical. First, they reviewed psychological research to map out a clear, four-stage model of habit formation. It starts with the decision to act and ends with the habit becoming fully automatic. Expert: Then, they performed a detailed content analysis of 57 popular habit-tracking apps. They downloaded them, used them, and systematically scored their features against the requirements of those four psychological stages. Host: And what were the key findings from that analysis? Expert: The results were striking. The vast majority of apps are heavily focused on the first two stages: deciding on a habit and starting the behavior. They excel at things like daily reminders and tracking streaks. Host: But they're missing the later stages? Expert: Almost completely. For example, the study found that not a single one of the 57 apps they analyzed had features to proactively phase out reminders or rewards as a user's habit gets stronger. They keep you hooked on the app's triggers. Host: Why would that be? It seems counterintuitive to the goal of forming a real habit. Expert: It is, and that points to the second major finding: a fundamental conflict of interest. The business model for most of these apps relies on continuous user engagement. They need you to keep opening the app every day. Expert: But the psychological goal of habit formation is for the behavior to become independent of the app. So the app’s commercial need is often directly at odds with the user's health goal. Host: Okay, this is the critical part for our listeners. What does this mean for businesses in the health-tech space? Why does this matter? Expert: It matters immensely because it reveals a massive opportunity. The study positions this as a blueprint for a more advanced category of apps called Digital Therapeutics, or DTx. Host: Remind us what those are. Expert: DTx are essentially "prescription apps"—software that is clinically validated and prescribed by a doctor to treat or prevent a disease. Because they have a clear medical purpose, their goal isn't just engagement; it's a measurable health outcome. Host: So they can be designed to make themselves obsolete for a particular habit? Expert: Precisely. A DTx doesn't need to keep a user forever. Its success is measured by the patient getting better. The study provides a roadmap with specific design principles for this, like building in features for "tapered reminding," where notifications fade out over time. Host: So the business takeaway is to shift the focus from engagement metrics to successful user "graduation"? Expert: Exactly. For any company in the digital health or wellness space, the future isn't just about keeping users, it's about proving you can create lasting, independent behavioral change. That is a far more powerful value proposition for patients, doctors, and insurance providers. Host: A fascinating perspective. So, to summarize: today's habit apps get us started but often fail at the finish line due to a conflict between their business model and our psychological needs. Host: This study, however, provides a clear roadmap for the next generation of Digital Therapeutics to bridge that gap, focusing on clinical outcomes rather than just app usage. Host: Alex, thank you for making that so clear for us. Expert: My pleasure, Anna. Host: And thank you for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we uncover more valuable insights from the world of research.
Behavioral Change, Digital Therapeutics, Habits, Habit Apps, Non-communicable diseases
Journal of the Association for Information Systems (2025)
Layering the Architecture of Digital Product Innovations: Firmware and Adapter Layers
Julian Lehmann, Philipp Hukal, Jan Recker, Sanja Tumbas
This study investigates how organizations integrate digital components into physical products to create layered architectures. Through a multi-year case study of a 3D printer company, it details the process of embedding firmware and creating adapter layers to connect physical hardware with higher-level software functionality.
Problem
As companies increasingly transform physical products into 'smart' digital innovations, they face the complex challenge of effectively integrating digital and physical components. There is a lack of clear understanding of how to structure this integration, which can limit a product's flexibility and potential for future upgrades.
Outcome
- The process of integrating digital and physical components is a bottom-up process, starting with making hardware controllable via software (a process called parametrizing). - The study identifies two key techniques for success: 1) parametrizing physical components through firmware, and 2) arranging digital functionality through higher-level adapter layers. - Creating 'adapter layers' is critical to bridge the gap between static physical components and flexible digital software, enabling them to communicate and work together. - This layered approach allows companies to innovate and add new features through software updates, enhancing product capabilities without needing to redesign the physical hardware.
Host: Welcome to A.I.S. Insights, the podcast where we connect academic research with real-world business strategy. I’m your host, Anna Ivy Summers. Today, we’re diving into a fascinating challenge: how do you successfully turn a traditional physical product into a smart, digitally-powered innovation?
Host: With me is our expert analyst, Alex Ian Sutherland. Alex, welcome.
Expert: Thanks for having me, Anna.
Host: We're discussing a study titled "Layering the Architecture of Digital Product Innovations: Firmware and Adapter Layers." In simple terms, it investigates how companies can effectively integrate digital components, like software, into physical products by creating a layered architecture. They looked at a 3D printer company to see how it’s done in practice.
Host: So Alex, let's start with the big problem. We see companies everywhere trying to make their products 'smart'—from smart toasters to smart cars. But the study suggests this is much harder than it looks. Why is it such a challenge?
Expert: It's a huge challenge because you can't just bolt a computer onto an old product and call it a day. The core issue, as the study on the 3D printer company PrintCo found, is that physical components are often designed in isolation. They aren't built to listen to or interact with digital technologies.
Expert: This creates a fundamental disconnect. Without a clear strategy for integration, a product’s potential is limited. It becomes rigid, difficult to upgrade, and you miss out on the flexibility that software can offer.
Host: So how did the researchers get an inside look at solving this problem? What was their approach?
Expert: They took a really practical approach. They conducted a multi-year case study of this company, PrintCo. They analyzed product documents, internal memos, and conducted interviews over a six-year period as the company evolved its 3D printers.
Expert: This allowed them to see, step-by-step, how PrintCo went from selling a basic, self-assembly kit to a sophisticated, software-integrated machine that could handle incredibly complex tasks. It provided a real-world blueprint for this transformation.
Host: Let's get to that blueprint. What were the key findings? What are the secret ingredients for successfully merging the physical and the digital?
Expert: The study uncovered two critical techniques. The first is what they call ‘parametrizing physical components’.
Host: That sounds a bit technical. What does it mean for a business audience?
Expert: Think of it as teaching the hardware to speak a digital language. You embed firmware—a type of low-level software—directly into the physical parts. This firmware defines parameters that software can control. For example, PrintCo wanted to solve the problem of printed objects warping as they cooled.
Expert: So, they added a heating element to the print bed. That's a physical change. But the key was parametrizing it—creating firmware that allowed higher-level software to precisely set and control the bed's temperature. The physical part was now addressable and controllable by code.
Host: Okay, so step one is making the hardware controllable. What’s the second technique?
Expert: The second is creating what the study calls 'adapter layers'. These are crucial. An adapter layer is essentially a bridge that connects the newly controllable hardware to the user-facing software. It translates complex hardware functions into simple, useful features.
Expert: For instance, PrintCo realized users struggled with the hundreds of settings required to get a perfect print. So they created an adapter layer in their software with preset 'print modes'—like a 'fast mode' or a 'high-quality mode'. Users just click a button, and the adapter layer tells the firmware exactly how to configure the hardware to achieve that result.
Host: So it’s a two-step process: first, teach the hardware to listen to software commands, and second, build a smart translator—an adapter layer—so the software can give meaningful instructions.
Expert: Exactly. And importantly, the study shows this is a bottom-up process. You have to get that foundational firmware layer right before you can build the really powerful software features on top.
Host: This is the most important question, Alex. Why does this matter for business? Why should a product manager or a CEO care about firmware and adapter layers?
Expert: Because this architecture is what separates a static product from a dynamic, evolving one. The first major business takeaway is future-proofing. This layered approach allows a company to add new capabilities and enhance performance through software updates, without needing a costly hardware redesign. PrintCo could add support for new materials or improve printing accuracy with a simple software patch.
Host: So it extends the product lifecycle and creates more value over time. What else?
Expert: The second takeaway is that it allows you to turn your product into a platform. By building these clean adapter layers, PrintCo was eventually able to open up its software to third-party developers. They created plug-ins for custom tasks, turning the printer from a closed device into an open ecosystem. That drives immense customer loyalty and engagement.
Host: That’s a powerful shift in strategy.
Expert: It is. And the final takeaway is that this provides a strategic roadmap. For any leader looking to digitize a physical product line, this study shows that the journey must be deliberate. It has to start at the lowest level—at the intersection of hardware and firmware. If you build that foundation correctly, you unlock incredible agility and innovation potential for years to come.
Host: Fantastic insights. So, to wrap up: if you want to successfully transform a physical product, the secret isn't just adding an app. The real work is in architecting the connection from the ground up.
Host: The key steps are to first, ‘parametrize’ your hardware with firmware so it’s digitally controllable. And second, build smart ‘adapter layers’ to bridge that hardware to user-friendly software features. The business payoff is huge: flexible, future-proof products that can evolve into vibrant innovation platforms.
Host: Alex Ian Sutherland, thank you for breaking this down for us.
Expert: My pleasure, Anna.
Host: And thanks to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we uncover more actionable ideas from the world of research.
Digital Product Innovation, Firmware, Product Architecture, Layering, Embedding, 3D Printing, Case Study
Journal of the Association for Information Systems (2025)
Responsible AI Design: The Authenticity, Control, Transparency Theory
Andrea Rivera, Kaveh Abhari, Bo Xiao
This study explores how to design Artificial Intelligence (AI) responsibly from the perspective of AI designers. Using a grounded theory approach based on interviews with industry professionals, the paper develops the Authenticity, Control, Transparency (ACT) theory as a new framework for creating ethical AI.
Problem
Current guidelines for responsible AI are fragmented and lack a cohesive theory to guide practice, leading to inconsistent outcomes. Existing research often focuses narrowly on specific attributes like algorithms or harm minimization, overlooking the broader design decisions that shape an AI's behavior from its inception.
Outcome
- The study introduces the Authenticity, Control, and Transparency (ACT) theory as a practical framework for responsible AI design. - It identifies three core mechanisms—authenticity, control, and transparency—that translate ethical design decisions into responsible AI behavior. - These mechanisms are applied across three key design domains: the AI's architecture, its algorithms, and its functional affordances (capabilities offered to users). - The theory shifts the focus from merely minimizing harm to also maximizing the benefits of AI, providing a more balanced approach to ethical design.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Today, we're diving into a foundational topic: how to build Artificial Intelligence responsibly from the ground up. We'll be discussing a fascinating study from the Journal of the Association for Information Systems titled, "Responsible AI Design: The Authenticity, Control, Transparency Theory".
Host: With me is our expert analyst, Alex Ian Sutherland. Alex, welcome.
Expert: Thanks for having me, Anna.
Host: So, Alex, let's start with the big picture. We hear a lot about AI ethics and responsible AI, but this study suggests there’s a fundamental problem with how we're approaching it. What's the issue?
Expert: The core problem is fragmentation. Right now, companies get bombarded with dozens of different ethical guidelines, principles, and checklists. It’s like having a hundred different recipes for the same dish, all with slightly different ingredients. It leads to confusion and inconsistent results.
Host: And the study argues this misses the point somehow?
Expert: Exactly. It points out three major misconceptions. First, we treat responsibility like a feature to be checked off a list, rather than a behavior designed into the AI's core. Second, we focus almost exclusively on the algorithm, ignoring the AI’s overall architecture and the actual capabilities it offers to users.
Host: And the third misconception?
Expert: It's that we're obsessed with only minimizing harm. That’s crucial, of course, but it's only half the story. True responsible design should also focus on maximizing the benefits and the value the AI provides.
Host: So how did the researchers get past these misconceptions to find a solution? What was their approach?
Expert: They went directly to the source. They conducted in-depth interviews with 24 professional AI designers—the people actually in the trenches, making the decisions that shape these systems every day. By listening to them, they built a theory from the ground up based on real-world practice, not just abstract ideals.
Host: That sounds incredibly practical. What were the key findings that emerged from those conversations?
Expert: The main outcome is a new framework called the Authenticity, Control, and Transparency theory—or ACT theory for short. It proposes that for an AI to behave responsibly, its design must be guided by these three core mechanisms.
Host: Okay, let's break those down. What do they mean by Authenticity?
Expert: Authenticity means the AI does what it claims to do, reliably and effectively. It’s about ensuring the AI's performance aligns with its intended purpose and ethical values. It has to be dependable and provide genuine utility.
Host: That makes sense. What about Control?
Expert: Control is about empowering users. It means giving people meaningful agency over the AI's behavior and its outputs. This could be anything from customization options to clear data privacy controls, ensuring the user is in the driver's seat.
Host: And the final piece, Transparency?
Expert: Transparency is about making the AI's operations clear and understandable. It’s not just about seeing the code, but understanding how the AI works, why it makes certain decisions, and what its limitations are. It’s the foundation for accountability and trust.
Host: So the ACT theory combines Authenticity, Control, and Transparency. Alex, this is the most important question for our listeners: why does this matter for business? What are the practical takeaways?
Expert: For business leaders, the ACT theory provides a clear, actionable roadmap. It moves responsible AI out of a siloed ethics committee and embeds it directly into the product design lifecycle. It gives your design, engineering, and product teams a shared language to build better AI.
Host: So it's about making responsibility part of the process, not an afterthought?
Expert: Precisely. And that has huge business implications. An AI that is authentic, controllable, and transparent is an AI that customers will trust. And in the digital economy, trust is everything. It drives adoption, enhances brand reputation, and ultimately, creates more valuable and successful products.
Host: It sounds like it’s a framework for building a competitive advantage.
Expert: It absolutely is. By adopting a framework like ACT, businesses aren't just managing risk or preparing for future regulation; they are actively designing better, safer, and more user-centric products that can win in the market.
Host: A powerful insight. To summarize for our listeners: the current approach to responsible AI is often fragmented. This study offers a solution with the ACT theory—a practical framework built on Authenticity, Control, and Transparency that can help businesses build AI that is not only ethical but more trustworthy and valuable.
Host: Alex Ian Sutherland, thank you for breaking this down for us.
Expert: My pleasure, Anna.
Host: And thank you for tuning in to A.I.S. Insights. We'll see you next time.
Responsible AI, AI Ethics, AI Design, Authenticity, Transparency, Control, Algorithmic Accountability
Journal of the Association for Information Systems (2025)
Continuous Contracting in Software Outsourcing: Towards A Configurational Theory
Thomas Huber, Kalle Lyytinen
This study investigates how governance configurations are formed, evolve, and influence outcomes in software outsourcing projects that use continuous contracting. Through a longitudinal, multimethod analysis of 33 governance episodes across three projects, the research identifies how different combinations of contract design and project control achieve alignment and flexibility. The methodology combines thematic analysis with crisp-set qualitative comparative analysis (csQCA) to develop a new theory.
Problem
Contemporary software outsourcing increasingly relies on continuous contracting, where an initial umbrella agreement is followed by periodic contracts. However, there is a significant gap in understanding how managers should combine contract design and project controls to balance the competing needs for project alignment and operational flexibility, and how these choices evolve to impact overall project performance.
Outcome
- Identified eight distinct governance configurations, each consistently linked to specific outcomes of alignment and flexibility. - Found that project outcomes depend on how governance elements interact within a configuration, either by substituting for each other or compensating for each other's limitations. - Showed that as trust and knowledge accumulate, managers' governance strategies evolve from simple configurations (achieving either alignment or flexibility) to more sophisticated ones that achieve both simultaneously. - Concluded that by deliberately evolving governance configurations, managers can better steer projects and enhance overall performance.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. In today's complex business world, outsourcing software development is common, but making it work is anything but simple. Today, we're diving into a fascinating study titled "Continuous Contracting in Software Outsourcing: Towards A Configurational Theory."
Host: It explores how companies can better manage these relationships, not through a single, rigid contract, but as an evolving partnership. With me to break it all down is our analyst, Alex Ian Sutherland. Alex, welcome.
Expert: Thanks for having me, Anna.
Host: So, Alex, let's start with the big picture. When a company outsources a major software project, what's the core problem this research is trying to solve?
Expert: The central problem is a classic business tension: you need to ensure the project stays on track and meets its goals, which we call 'alignment'. But you also need to be able to adapt to changes and new ideas, which is 'flexibility'.
Host: And traditional contracts aren't great at handling both, are they?
Expert: Exactly. A traditional, iron-clad contract might be good for alignment, but it's too rigid. So, many companies now use 'continuous contracting'—an initial umbrella agreement followed by smaller, periodic contracts or statements of work. The challenge is, there's been very little guidance on how managers should actually combine the contract details with day-to-day project management to get that balance right.
Host: It sounds like a real juggling act. So how did the researchers get inside these complex relationships to figure out what works?
Expert: They conducted a really deep, multi-year study of three large software projects. They analyzed 33 different contracting periods, or 'episodes', looking at all the contractual documents and project plans. Crucially, they also conducted in-depth interviews with managers from both the client and the vendor side to understand their thinking and the results of their decisions.
Host: So they weren't just looking at the documents; they were looking at the entire process in action. What were the key findings?
Expert: They had a few big 'aha' moments. First, there is no single 'best' way to manage an outsourcing contract. Instead, they identified eight distinct recipes, or what they call 'governance configurations'. Each one is a specific mix of contract design and project controls that consistently leads to a predictable outcome.
Host: And these outcomes relate back to that tension you mentioned between alignment and flexibility?
Expert: Precisely. Some of these recipes were great at achieving alignment, keeping the project strictly on task. Others were designed to maximize flexibility, allowing for innovation. But the most interesting finding was how the different elements within a recipe work together.
Host: What do you mean by that?
Expert: Some elements can substitute for each other. For instance, if your contract isn't very detailed, you can substitute for that with very close, hands-on project monitoring. Other elements compensate for each other's weaknesses. A detailed contract might provide alignment, but you can compensate for its rigidity by including a 'task buffer' that gives the vendor freedom to solve unforeseen problems.
Host: That makes sense. It’s about the combination, not just the individual parts. Was there another key finding?
Expert: Yes, and it’s a crucial one. These configurations evolve over time. The study showed that as trust and project-specific knowledge build between the client and the vendor, their approach matures. They might start with simple setups that achieve only alignment *or* flexibility, but they learn to use more sophisticated recipes that achieve both at the same time.
Host: This is the part our listeners are waiting for. What does this all mean for a business leader managing an outsourcing partner?
Expert: The most important takeaway is to stop seeing contracts as static legal documents that you file away. You need to see contracting as an active, dynamic management tool. It’s a set of levers you can pull throughout the project.
Host: So managers need to be more strategic and deliberate.
Expert: Exactly. Be deliberate about the recipe you're using. Ask yourself: in this phase of the project, do I need to prioritize alignment, flexibility, or both? Then, choose the right combination of tools—like how specific the contract is, whether you grant the vendor autonomy on certain tasks, and how you formalize changes.
Host: And what about the role of trust that you mentioned?
Expert: It's fundamental. The study clearly shows that investing time and effort in building a trusting relationship and shared knowledge pays dividends. It literally expands your management toolkit, allowing you to use those more advanced, high-performing configurations that deliver better results in the long run.
Host: So, to summarize: managers should view software outsourcing contracts not as a single event, but as a continuous management process. Success comes from deliberately choosing the right recipe of contract and control elements for the job. And by investing in the relationship, you can evolve that recipe over time to achieve both tight alignment and crucial flexibility, driving superior project performance.
Host: Alex Ian Sutherland, thank you for bringing this research to life for us.
Expert: My pleasure, Anna.
Host: And thank you to our audience for tuning into A.I.S. Insights, powered by Living Knowledge.
Journal of the Association for Information Systems (2025)
Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir)responsibility and Information Security Performance
Qian Wang, Dan Pienta, Shenyang Jiang, Eric W. T. Ngai, Jason Bennett Thatcher
This study investigates the relationship between a company's social performance toward its employees and its information security outcomes. Using an eight-year analysis of publicly listed firms and a scenario-based experiment, the research examines how both positive actions (employee-related Corporate Social Responsibility) and negative actions (employee-related Corporate Social Irresponsibility) affect a firm's security risks.
Problem
Information security breaches are frequently caused by human error, which often stems from a misalignment between employee goals and a firm's security objectives. This study addresses the gap in human-centric security strategies by exploring whether improving employee well-being and social treatment can align these conflicting interests, thereby reducing security vulnerabilities and data breaches.
Outcome
- A firm's engagement in positive, employee-related corporate social responsibility (CSR) is associated with reduced information security risks. - Conversely, a firm's involvement in socially irresponsible activities toward employees (CSiR) is positively linked to an increase in security risks. - The impact of these positive and negative actions on security is amplified when the actions are unique compared to industry peers. - Experimental evidence confirmed that these effects are driven by changes in employees' security commitment, willingness to monitor peers for security compliance, and overall loyalty to the firm.
Host: Welcome to A.I.S. Insights, the podcast at the intersection of business and technology, powered by Living Knowledge. I'm your host, Anna Ivy Summers. Host: Today, we're diving into a study that connects two areas of business we don't often talk about together: human resources and cybersecurity. Host: The study is titled, "Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir)responsibility and Information Security Performance." Host: In short, it investigates whether a company’s social performance toward its employees is directly linked to its information security. With me to unpack this is our analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Great to be here, Anna. Host: Alex, we all hear about massive data breaches in the news. We tend to imagine sophisticated external hackers. But this study points the finger in a different direction, doesn't it? Expert: It certainly does. The real-world problem is that the vast majority of information security breaches—one report from Verizon suggests over 80%—involve a human element inside the company. Host: So, it's not always malicious? Expert: Rarely, in fact. It’s often unintentional human error or negligence. The study highlights a fundamental misalignment: for the company, security is paramount. For an employee, security protocols can feel like an obstacle to just getting their job done. Host: The classic example being someone who writes their password on a sticky note. Expert: Exactly. That employee isn't trying to harm the company; they're just trying to log in quickly. The study frames this using what’s known as the principal-agent theory—the goals of the company, the principal, aren't automatically aligned with the goals of the employee, the agent. This research asks if treating employees better can fix that misalignment. Host: A fascinating question. So how did the researchers connect the dots between something like an employee wellness program and the risk of a data breach? Expert: They used a really robust multi-study approach. First, they conducted a large-scale analysis, looking at eight years of data from thousands of publicly listed firms. They matched up data on employee treatment—both positive and negative—with records of data breaches. Host: So that established a correlation. Expert: Correct. But to understand the "why," they followed it up with a scenario-based experiment. They presented participants with stories about a fictional company that either treated its employees very well or very poorly, and then measured how the participants would behave regarding security in that environment. Host: Let's get to the results then. What were the key findings from this work? Expert: The connection was incredibly clear and worked in both directions. First, a firm's engagement in positive, employee-related corporate social responsibility, or CSR, was directly associated with reduced information security risks. Host: So, doing good is good for security. What about the opposite? Expert: The opposite was just as true. Firms involved in socially irresponsible activities toward their employees—think labor disputes or safety violations—had a significantly higher risk of data breaches. The study calls this CSiR, with an 'i' for irresponsibility. Host: That’s a powerful link. Was there anything else that stood out? Expert: Yes, a really intriguing finding on what they called 'uniqueness'. The impact was amplified when a company’s actions stood out from their industry peers. Host: What do you mean? Expert: If your company offers benefits that are uniquely good for your sector, employees value that more, and the positive security effect is even stronger. Conversely, if your company treats employees in a way that is uniquely bad compared to competitors, the negative security risk goes up even more. Being an outlier really matters. Host: This is the critical part for our audience, Alex. Why does this matter for business leaders, and what should they do with this information? Expert: The most crucial takeaway is that investing in employee well-being is not just an HR or ethics initiative—it is a core cybersecurity strategy. You cannot simply buy more technology to solve this problem; you have to invest in your people. Host: So a company's Chief People Officer should be in close contact with their Chief Information Security Officer. Expert: Absolutely. The experimental part of the study proved why this works. When employees feel valued, three things happen: their personal commitment to security goes up; they become more willing to monitor their peers and foster a security-conscious culture; and their overall loyalty to the firm increases. Host: And that loyalty prevents both carelessness and, in worst-case scenarios, actual data theft by disgruntled employees. Expert: Precisely. For a leader listening now, the advice is twofold. First, you have to play both offense and defense. Promoting positive programs isn't enough; you must actively prevent and address negative behaviors. Second, benchmark against your industry and strive to be a uniquely good employer. That differentiation is a powerful, and often overlooked, security advantage. Host: So, to summarize this fascinating study: how you treat your people is a direct predictor of your vulnerability to a data breach. Doing good reduces risk, doing harm increases it, and being an exceptional employer can give you an exceptional edge in security. Host: It’s a compelling case that your employees truly are your first and most important line of defense. Alex, thank you for breaking this down for us. Expert: My pleasure, Anna. Host: And thank you for tuning in to A.I.S. Insights. We'll see you next time.
Information Security, Data Breach, Employee-Related Social Performance, Corporate Social Responsibility, Agency Theory, Cybersecurity Risk
Journal of the Association for Information Systems (2025)
What Is Augmented? A Metanarrative Review of AI-Based Augmentation
Inès Baer, Lauren Waardenburg, Marleen Huysman
This paper conducts a comprehensive literature review across five research disciplines to clarify the concept of AI-based augmentation. Using a metanarrative review method, the study identifies and analyzes four distinct targets of what AI augments: the body, cognition, work, and performance. Based on this framework, the authors propose an agenda for future research in the field of Information Systems.
Problem
In both academic and public discussions, Artificial Intelligence is often described as a tool for 'augmentation' that helps humans rather than replacing them. However, this popular term lacks a clear, agreed-upon definition, and there is little discussion about what specific aspects of human activity are the targets of this augmentation. This research addresses the fundamental question: 'What is augmented by AI?'
Outcome
- The study identified four distinct metanarratives, or targets, of AI-based augmentation: the body (enhancing physical and sensory functions), cognition (improving decision-making and knowledge), work (creating new employment opportunities and improving work practices), and performance (increasing productivity and innovation). - Each augmentation target is underpinned by a unique human-AI configuration, ranging from human-AI symbiosis for body augmentation to mutual learning loops for cognitive augmentation. - The paper reveals tensions and counternarratives for each target, showing that augmentation is not purely positive; for example, it can lead to over-dependence on AI, deskilling, or a loss of human agency. - The four augmentation targets are interconnected, creating potential conflicts (e.g., prioritizing performance over meaningful work) or dependencies (e.g., cognitive augmentation relies on augmenting bodily senses).
Host: Welcome to A.I.S. Insights, the podcast where we connect Living Knowledge to your business. I'm your host, Anna Ivy Summers. Host: We hear it all the time: AI isn't here to replace us, but to *augment* us. It's a reassuring idea, but what does it actually mean? Host: Today, we’re diving into a fascinating new study from the Journal of the Association for Information Systems. It's titled, "What Is Augmented? A Metanarrative Review of AI-Based Augmentation." Host: The study looks across multiple research fields to clarify this very concept. It identifies four distinct things that AI can augment: our bodies, our cognition, our work, and our performance. Host: To help us unpack this is our analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: So Alex, let's start with the big problem. Why did we need a study to define a word we all think we understand? Expert: That's the core of the issue. In business, 'augmentation' has become a popular, optimistic buzzword. It's used to ease fears about automation and job loss. Expert: But the study points out that the term is incredibly vague. When a company says it's using AI for augmentation, it's not clear what they're actually trying to improve. Expert: The researchers ask a simple but powerful question that's often overlooked: if we're making something 'more,' what is that something? More skills? More productivity? This lack of clarity is a huge barrier to forming an effective AI strategy. Host: So the first step is to get specific. How did the study go about creating a clearer picture? Expert: They took a really interesting approach. Instead of just looking at one field, they analyzed research from five different disciplines, including computer science, management, and economics. Expert: They were looking for the big, overarching storylines—or metanarratives—that different experts tell about AI augmentation. This allowed them to cut through the jargon and identify the fundamental targets of what's being augmented. Host: And that led them to the key findings. What were these big storylines they uncovered? Expert: They distilled it all down to four clear targets. The first is augmenting the **body**. This is about enhancing our physical and sensory functions—think of a surgeon using a robotic arm for greater precision or an engineer using AR glasses to see schematics overlaid on real-world equipment. Host: Okay, so a very direct, physical enhancement. What’s the second? Expert: The second is augmenting **cognition**. This is about improving our thinking and decision-making. For example, AI can help financial analysts identify subtle market patterns or assist doctors in making a faster, more accurate diagnosis. It's about enhancing our mental capabilities. Host: That makes sense. And the third? Expert: Augmenting **work**. This focuses on changing the nature of jobs and tasks. A classic example is an AI chatbot handling routine customer queries. This doesn't replace the human agent; it frees them up to handle more complex, emotionally nuanced problems, making their work potentially more fulfilling. Host: And the final target? Expert: That would be augmenting **performance**. This is the one many businesses default to, and it's all about increasing productivity, efficiency, and innovation at a systemic level. Think of AI optimizing a global supply chain or accelerating the R&D process for a new product. Host: That's a fantastic framework. But the study also found that augmentation isn't a purely positive story, is it? Expert: Exactly. This is a critical insight. For each of those four targets, the study identified tensions or counternarratives. Expert: For example, augmenting cognition can lead to over-dependence and deskilling if we stop thinking for ourselves. Augmenting work can backfire if AI dictates every action, turning an employee into someone who just follows a script, which reduces their agency and job satisfaction. Host: This brings us to the most important question, Alex. Why does this matter for business leaders? How can they use this framework? Expert: It matters immensely. First, it forces strategic clarity. A leader can now move beyond saying "we're using AI to augment our people." They should ask, "Which of the four targets are we aiming for?" Expert: Is the goal to augment the physical abilities of our warehouse team? That's a **body** strategy. Is it to improve the decisions of our strategy team? That's a **cognition** strategy. Being specific is the first step. Host: And what comes after getting specific? Expert: Understanding the trade-offs. The study shows these targets can be in conflict. A strategy that relentlessly pursues **performance** by automating everything possible might directly undermine a goal to augment **work** by making jobs more meaningful. Leaders need to see this tension and make conscious choices about their priorities. Host: So it’s about choosing a target and understanding its implications. Expert: Yes, and finally, it's about designing the right kind of human-AI partnership. Augmenting the body implies a tight, almost symbiotic relationship. Augmenting cognition requires creating mutual learning loops, where humans train the AI and the AI provides insights that train the humans. It's not one-size-fits-all. Host: So to sum up, it seems the key message for business leaders is to move beyond the buzzword. Host: This study gives us a powerful framework for doing just that. By identifying whether you are trying to augment the body, cognition, work, or performance, you can build a much smarter, more intentional AI strategy. Host: You can anticipate the risks, navigate the trade-offs, and ultimately create a more effective collaboration between people and technology. Host: Alex, thank you for making that so clear for us. Expert: My pleasure, Anna. Host: And thank you for listening to A.I.S. Insights — powered by Living Knowledge. We'll see you next time.
Journal of the Association for Information Systems (2025)
Making Sense of Discursive Formations and Program Shifts in Large-Scale Digital Infrastructures
Egil Øvrelid, Bendik Bygstad, Ole Hanseth
This study examines how public and professional discussions, known as discourses, shape major changes in large-scale digital systems like national e-health infrastructures. Using an 18-year in-depth case study of Norway's e-health development, the research analyzes how high-level strategic trends interact with on-the-ground practical challenges to drive fundamental shifts in technology programs.
Problem
Implementing complex digital infrastructures like national e-health systems is notoriously difficult, and leaders often struggle to understand why some initiatives succeed while others fail. Previous research focused heavily on the role of powerful individuals or groups, paying less attention to the underlying, systemic influence of how different conversations about technology and strategy converge over time. This gap makes it difficult for policymakers to make sensible, long-term decisions and navigate the evolution of these critical systems.
Outcome
- Major shifts in large digital infrastructure programs occur when high-level strategic discussions (macrodiscourses) and practical, operational-level discussions (microdiscourses) align and converge. - This convergence happens through three distinct processes: 'connection' (a shared recognition of a problem), 'matching' (evaluating potential solutions that fit both high-level goals and practical needs), and 'merging' (making a decision and reconciling the different perspectives). - The result of this convergence is a new "discursive formation"—a powerful, shared understanding that aligns stakeholders, technology, and strategy, effectively launching a new program and direction. - Policymakers and managers can use this framework to better analyze the alignment between broad technological trends and their organization's specific, internal needs, leading to more informed and realistic strategic planning.
Host: Welcome to A.I.S. Insights, the podcast where we connect big ideas with business reality, powered by Living Knowledge. I’m your host, Anna Ivy Summers.
Host: Today we're diving into a fascinating new study titled "Making Sense of Discursive Formations and Program Shifts in Large-Scale Digital Infrastructures." In short, it explores how the conversations we have—both in the boardroom and on the front lines—end up shaping massive technological changes, like a national e-health system.
Host: To help us break it down, we have our expert analyst, Alex Ian Sutherland. Welcome, Alex.
Expert: It's great to be here, Anna.
Host: So, Alex, let's start with the big picture. We've all seen headlines about huge, expensive government or corporate IT projects that go off the rails. What's the core problem this study is trying to solve?
Expert: The core problem is exactly that. Leaders of these massive digital infrastructure projects, whether in healthcare, finance, or logistics, often struggle to understand why some initiatives succeed and others fail spectacularly. For a long time, the thinking was that it all came down to a few powerful decision-makers.
Host: But this study suggests it's more complicated than that.
Expert: Exactly. It argues that we've been paying too little attention to the power of conversations themselves—and how different streams of discussion come together over time to create real, systemic change. It’s not just about what one CEO decides; it’s about the alignment of many different voices.
Host: How did the researchers even begin to study something as broad as "conversations"? What was their approach?
Expert: They took a very deep, long-term view. The research is built on an incredible 18-year case study of Norway's national e-health infrastructure development. They analyzed everything from high-level policy documents and media reports to interviews with the clinicians and IT staff actually using the systems day-to-day.
Host: Eighteen years. That's some serious dedication. After all that time, what did they find is the secret ingredient for making these major program shifts happen successfully?
Expert: The key finding is a concept they call "discourse convergence." It sounds academic, but the idea is simple. A major shift only happens when the high-level, strategic conversations, which they call 'macrodiscourses', finally align with the practical, on-the-ground conversations, the 'microdiscourses'.
Host: Can you give us an example of those two types of discourse?
Expert: Absolutely. A 'macrodiscourse' is the big-picture buzz. Think of consultants and politicians talking about exciting new trends like 'Service-Oriented Architecture' or 'Digital Ecosystems'. A 'microdiscourse', on the other hand, is the reality on the ground. It's the nurse complaining that the systems are so fragmented she has to tell a patient's history over and over again because the data doesn't connect.
Host: And a major program shift occurs when those two worlds meet?
Expert: Precisely. The study found this happens through a three-step process. First is 'connection', where everyone—from the C-suite to the front line—agrees that there's a significant problem. Second is 'matching', where potential solutions are evaluated to see if they fit both the high-level strategic goals and the practical, day-to-day needs.
Host: And the final step?
Expert: The final step is 'merging'. This is where a decision is made, and a new, shared understanding is formed that reconciles those different perspectives. That new shared understanding is powerful—it aligns the stakeholders, the technology, and the strategy, effectively launching a whole new direction for the program.
Host: This is the critical question, then. What does this mean for business leaders listening right now? How can they apply this framework to their own digital transformation projects?
Expert: This is where it gets really practical. The biggest takeaway is that leaders must listen to both conversations. It’s easy to get swept up in the latest tech trend—the macrodiscourse. But if that new strategy doesn't solve a real, tangible pain point for your employees or customers—the microdiscourse—it's destined to fail.
Host: So it's about bridging the gap between the executive suite and the people actually doing the work.
Expert: Yes, and leaders need to be proactive about it. Don't just wait for these conversations to align by chance. Create forums where your big-picture strategists and your on-the-ground operators can find that 'match' together. Use this as a diagnostic tool. Ask yourself: is the grand vision for our new platform completely disconnected from the daily struggles our teams are facing with the old one? If the answer is yes, you have a problem.
Host: A brilliant way to pressure-test a strategy. So, to sum up, these huge technology shifts aren't just top-down mandates. They succeed when high-level strategy converges with on-the-ground reality, through a process of connecting on a problem, matching a viable solution, and merging toward a new, shared goal.
Expert: That's the perfect summary, Anna.
Host: Alex Ian Sutherland, thank you so much for translating this complex research into such clear, actionable insights.
Expert: My pleasure.
Host: And thanks to all of you for tuning in to A.I.S. Insights, powered by Living Knowledge. Join us next time as we decode another big idea for your business.
Discursive Formations, Discourse Convergence, Large-Scale Digital Infrastructures, E-Health Programs, Program Shifts, Sociotechnical Systems, IT Strategy
Journal of the Association for Information Systems (2025)
Digital Infrastructure Development Through Digital Infrastructuring Work: An Institutional Work Perspective
Adrian Yeow, Wee-Kiat Lim, Samer Faraj
This paper investigates the complexities of developing large-scale digital infrastructure through a case study of an electronic medical record (EMR) system implementation in a U.S. hospital. It introduces and analyzes the concept of 'digital infrastructuring work'—the combination of technical, social, and symbolic actions that organizational actors perform. The study provides a framework for understanding the tensions and actions that shape the outcomes of such projects.
Problem
Implementing new digital infrastructures in large organizations is challenging because it often disrupts established routines and power structures, leading to resistance and project stalls. Existing research frequently overlooks how the combination of technical tasks, social negotiations, and symbolic arguments by different groups influences the success or failure of these projects. This study addresses this gap by providing a more holistic view of the work involved in digital infrastructure development from an institutional perspective.
Outcome
- The study introduces 'digital infrastructuring work' to explain how actors shape digital infrastructure development, categorizing it into three forms: digital object work (technical tasks), DI relational work (social interactions), and DI symbolic work (discursive actions). - It finds that project stakeholders strategically combine these forms of work to either support change or maintain existing systems, highlighting the contested nature of infrastructure projects. - The success or failure of a digital infrastructure project is shown to depend on how effectively different groups navigate the tensions between change and stability by skillfully blending technical, relational, and symbolic efforts. - The paper demonstrates that technical work itself carries institutional significance and is not merely a neutral backdrop for social interactions, but a key site of contestation.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we’re diving into the often-messy reality of large-scale technology projects. With me is our expert analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Great to be here, Anna. Host: We're discussing a study titled "Digital Infrastructure Development Through Digital Infrastructuring Work: An Institutional Work Perspective". In short, it looks at the complexities of implementing something like a new enterprise-wide software system, using a case study of an electronic medical record system in a hospital. Expert: Exactly. It provides a fascinating framework for understanding all the moving parts—technical, social, and even political—that can make or break these massive projects. Host: Let’s start with the big problem. Businesses spend millions on new digital infrastructure, but so many of these projects stall or fail. Why is that? Expert: It’s because these new systems don’t just replace old software; they disrupt routines, workflows, and even power structures that have been in place for years. People and departments often resist, but that resistance isn’t always obvious. Host: The study looked at a real-world example of this, right? Expert: It did. The researchers followed a large U.S. hospital trying to implement a new, centralized electronic medical record system. The goal was to unify everything. Expert: But they immediately ran into a wall. The hospital was really two powerful groups: the central hospital administration and the semi-independent School of Medicine, which had its own way of doing things, its own processes, and its own IT systems. Host: So it was a turf war disguised as a tech project. Expert: Precisely. The new system threatened the autonomy and revenue of the medical school's clinics, and they pushed back hard. The project ground to a halt not because the technology was bad, but because of these deep-seated institutional tensions. Host: So how did the researchers get such a detailed view of this conflict? What was their approach? Expert: They essentially embedded themselves in the project for several years. They conducted over 50 interviews with everyone from senior management to the IT staff on the ground. They sat in on project meetings, observed the teams at work, and analyzed project documents. It was a true behind-the-scenes look at what was happening. Host: And what were the key findings from that deep dive? Expert: The central finding is a concept the study calls ‘digital infrastructuring work’. It’s a way of saying that to get a project like this done, you need to perform three different kinds of work at the same time. Host: Okay, break those down for us. What’s the first one? Expert: First is ‘digital object work’. This is what we traditionally think of as IT work: reprogramming databases, coding new interfaces, and connecting different systems. It's the hands-on technical stuff. Host: Makes sense. What's the second? Expert: The second is ‘relational work’. This is all about the social side: negotiating with other teams, building coalitions, escalating issues to senior leaders, or even strategically avoiding meetings and delaying tasks to slow things down. Host: And the third? Expert: The third is ‘symbolic work’. This is the battle of narratives. It’s the arguments and justifications people use. For example, one team might argue for change by highlighting future efficiencies, while another team resists by claiming the new system is incompatible with their "unique and essential" way of working. Host: So the study found that these projects are a constant struggle between groups using all three of these tactics? Expert: Exactly. In the hospital case, the team trying to implement the new system was doing technical work, but the opposing teams were using relational work, like delaying participation, and symbolic work, arguing their old systems were too complex to change. Expert: A fascinating example was how one team timed a major upgrade to their own legacy system to coincide with the rollout of the new one. Technically, it was just an upgrade. But strategically, it was a brilliant move that made integration almost impossible and sabotaged the project's timeline. It shows that even technical work can be a political weapon. Host: This is the crucial part for our audience, Alex. What are the key business takeaways? Why does this matter for a manager or a CEO? Expert: The biggest takeaway is that you cannot treat a digital transformation as a purely technical project. It is fundamentally a social and political one. If your plan only has technical milestones, it’s incomplete. Host: So leaders need to think beyond the technology itself? Expert: Absolutely. They need to anticipate strategic resistance. Resistance won't always be a direct 'no'. It might look like a technical hurdle, a sudden resource constraint, or an argument about security protocols. This study gives leaders a vocabulary to recognize these moves for what they are—a blend of relational and symbolic work. Host: So what’s the practical advice? Expert: You need a political plan to go with your project plan. Before you start, map out the stakeholders. Ask yourself: Who benefits from this change? And more importantly, who perceives a loss of power, autonomy, or budget? Expert: Then, you have to actively manage those three streams of work. You need your tech teams doing the digital object work, yes. But you also need leaders and managers building coalitions, negotiating, and constantly reinforcing the narrative—the symbolic work—of why this change is essential for the entire organization. Success depends on skillfully blending all three. Host: So to wrap up, a major technology project is never just about the technology. It's a complex interplay of technical tasks, social negotiations, and competing arguments. Host: And to succeed, leaders must be orchestrating all three fronts at once, anticipating resistance, and building the momentum needed to overcome it. Host: Alex, this has been incredibly insightful. Thank you for breaking it down for us. Expert: My pleasure, Anna. Host: And thank you for listening to A.I.S. Insights, powered by Living Knowledge. Join us next time for more actionable intelligence from the world of academic research.
Digital Infrastructure Development, Institutional Work, IT Infrastructure Management, Healthcare Information Systems, Digital Objects, Case Study
Communications of the Association for Information Systems (2025)
Unpacking Board-Level IT Competency
Jennifer Jewer, Kenneth N. McKay
This study investigates how to best measure IT competency on corporate boards of directors. Using a survey of 75 directors in Sri Lanka, the research compares the effectiveness of indirect 'proxy' measures (like prior work experience) against 'direct' measures (assessing specific IT knowledge and governance practices) in reflecting true board IT competency and its impact on IT governance.
Problem
Many companies struggle with poor IT governance, which is often blamed on a lack of IT competency at the board level. However, there is no clear consensus on what constitutes board IT competency or how to measure it effectively. Previous research has relied on various proxy measures, leading to inconsistent findings and uncertainty about how boards can genuinely improve their IT oversight.
Outcome
- Direct measures of IT competency are more accurate and reliable indicators than indirect proxy measures. - Boards with higher directly-measured IT competency demonstrate stronger IT governance. - Among proxy measures, having directors with work experience in IT roles or management is more strongly associated with good IT governance than having directors with formal IT training. - The study validates a direct measurement approach that boards can use to assess their competency gaps and take targeted steps to improve their IT governance capabilities.
Host: Welcome to A.I.S. Insights, the podcast at the intersection of business, technology, and Living Knowledge. I’m your host, Anna Ivy Summers.
Host: In a world driven by digital transformation, a company's success often hinges on its technology strategy. But who oversees that strategy at the highest level? The board of directors. Today, we’re unpacking a fascinating study from the Communications of the Association for Information Systems titled, "Unpacking Board-Level IT Competency."
Host: It investigates a critical question: how do we actually measure IT competency on a corporate board? Is it enough to have a former CIO on the team, or is there a better way? Here to guide us is our expert analyst, Alex Ian Sutherland. Alex, welcome.
Expert: Thanks for having me, Anna.
Host: So Alex, let's start with the big picture. What is the real-world problem this study is trying to solve?
Expert: The problem is that many companies have surprisingly poor IT governance. We see the consequences everywhere—data breaches, failed digital projects, and missed opportunities. Often, the blame is pointed at the board for not having enough IT savvy.
Host: But "IT savvy" sounds a bit vague. How have companies traditionally tried to measure this?
Expert: Exactly. That's the core issue. For years, research and board recruitment have relied on what this study calls 'proxy' measures. Think of it as looking at a resume: does a director have a computer science degree? Did they once work in an IT role? The problem is, these proxies have led to inconsistent and often contradictory findings about what actually improves IT oversight.
Host: It sounds like looking at a resume isn't telling the whole story. So, how did the researchers approach this differently?
Expert: They took a more direct route. They surveyed 75 board directors in Sri Lanka and compared those traditional proxy measures with 'direct' measures. Instead of just asking *if* a director had IT experience, they asked questions to gauge the board's *actual* collective knowledge and practices.
Host: What do you mean by direct measures? Can you give an example?
Expert: Certainly. A direct measure would assess the board's knowledge of the company’s specific IT risks, its IT budget, and its overall IT strategy. It also looks at governance mechanisms—things like, is IT a regular item on the meeting agenda? Does the board get independent assurance on cybersecurity risks? It measures what the board actively knows and does, not just what’s on paper.
Host: That makes perfect sense. So, when they compared the two approaches—the resume proxies versus the direct assessment—what were the key findings?
Expert: The results were quite clear. First, the direct measures of IT competency were found to be far more accurate and reliable indicators of a board's capability than any of the proxy measures.
Host: And did that capability translate into better performance?
Expert: It did. The second key finding was that boards with higher *directly-measured* IT competency demonstrated significantly stronger IT governance. This creates a clear link: a board that truly understands and engages with technology governs it more effectively.
Host: What about those traditional proxy measures? Was any of them useful at all?
Expert: That was another interesting finding. When they looked only at the proxies, having directors with practical work experience in IT management was a much better predictor of good governance than just having directors with a formal IT degree. Hands-on experience seems to matter more than academic training from years ago.
Host: Alex, this is the most important question for our listeners. What does this all mean for business leaders? What are the key takeaways?
Expert: I think there are three critical takeaways. First, stop just 'checking the box'. Appointing a director who had a tech role a decade ago might look good, but it's not a silver bullet. You need to assess the board's *current* and *collective* knowledge.
Host: So, how should a board do that?
Expert: That's the second takeaway: use a direct assessment. This study validates a method for boards to honestly evaluate their competency gaps. As part of an annual review, a board can ask: Do we understand the risks and opportunities of AI? Are we confident in our cybersecurity oversight? This allows for targeted improvements, like director training or more focused recruitment.
Host: You mentioned that competency is also about what a board *does*.
Expert: Absolutely, and that’s the third takeaway: build strong IT governance mechanisms. True competency isn't just knowledge; it's process. Simple actions like ensuring the Chief Information Officer regularly participates in board meetings or making technology a standard agenda item can massively increase the board’s capacity to govern effectively. It turns individual knowledge into a collective, strategic asset.
Host: So, to summarize: It’s not just about who is on the board, but what the board collectively knows and, crucially, what it does. Relying on resumes is not enough; boards need to directly assess their IT skills and build the processes to use them.
Expert: You've got it. It’s about moving from a passive, resume-based approach to an active, continuous process of building and applying IT competency.
Host: Fantastic insights. That’s all the time we have for today. Alex Ian Sutherland, thank you for breaking this down for us.
Expert: My pleasure, Anna.
Host: And a big thank you to our listeners for tuning into A.I.S. Insights, powered by Living Knowledge. Join us next time as we continue to explore the ideas shaping the future of business.
Board of Directors, Board IT Competency, IT Governance, Proxy Measures, Direct Measures, Corporate Governance
Communications of the Association for Information Systems (2025)
The Impact of Gamification on Cybersecurity Learning: Multi-Study Analysis
J.B. (Joo Baek) Kim, Chen Zhong, Hong Liu
This paper systematically assesses the impact of gamification on cybersecurity education through a four-semester, multi-study approach. The research compares learning outcomes between gamified and traditional labs, analyzes student perceptions and motivations using quantitative methods, and explores learning experiences through qualitative interviews. The goal is to provide practical strategies for integrating gamification into cybersecurity courses.
Problem
There is a critical and expanding cybersecurity workforce gap, emphasizing the need for more effective, practical, and engaging training methods. Traditional educational approaches often struggle to motivate students and provide the necessary hands-on, problem-solving skills required for the complex and dynamic field of cybersecurity.
Outcome
- Gamified cybersecurity labs led to significantly better student learning outcomes compared to traditional, non-gamified labs. - Well-designed game elements, such as appropriate challenges and competitiveness, positively influence student motivation. Intrinsic motivation (driven by challenge) was found to enhance learning outcomes, while extrinsic motivation (driven by competition) increased career interest. - Students found gamified labs more engaging due to features like instant feedback, leaderboards, clear step-by-step instructions, and story-driven scenarios that connect learning to real-world applications. - Gamification helps bridge the gap between theoretical knowledge and practical skills, fostering deeper learning, critical thinking, and a greater interest in pursuing cybersecurity careers.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: In a world of ever-growing digital threats, how can businesses train a more effective cybersecurity workforce? Today, we're diving into a fascinating multi-study analysis titled "The Impact of Gamification on Cybersecurity Learning." Host: This study systematically assesses how using game-like elements in training can impact learning, motivation, and even career interest in cybersecurity. Host: And to help us break it down, we have our expert analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Great to be here, Anna. Host: Alex, let's start with the big picture. What is the real-world problem this study is trying to solve? Expert: The problem is massive, and it's growing every year. It’s the cybersecurity workforce gap. The study cites a 2024 report showing the global shortage of professionals has expanded to nearly 4.8 million. Host: Almost 5 million people. That’s a staggering number. Expert: It is. And the core issue is that traditional educational methods often fail. They can be dry, theoretical, and they don't always build the practical, hands-on problem-solving skills needed to fight modern cyber threats. Companies need people who are not just knowledgeable, but also engaged and motivated. Host: So how did the researchers approach this challenge? How do you even begin to measure the impact of something like gamification? Expert: They used a really comprehensive mixed-method approach over four university semesters. It was essentially three studies in one. Host: Tell us about them. Expert: First, they directly compared the performance of students in gamified labs against those in traditional, non-gamified labs. They measured this with quizzes and final exam scores. Host: So, a direct A/B test on learning outcomes. Expert: Exactly. Second, they used quantitative surveys to understand the "why" behind the performance. They looked at what motivated the students – things like challenge, competition, and how that affected their learning and career interests. Host: And the third part? Expert: That was qualitative. The researchers conducted in-depth interviews with students to get rich, subjective feedback on their actual learning experience. They wanted to know what it felt like, in the students' own words. Host: So, after all that research, what were the key findings? Did making cybersecurity training a 'game' actually work? Expert: It worked, and in very specific ways. The first major finding was clear: students in the gamified labs achieved significantly better learning outcomes. Their scores were higher. Host: And the study gave some clues as to why? Expert: It did. This is the second key finding. Well-designed game elements had a powerful effect on motivation, but it's important to distinguish between two types. Host: Intrinsic and extrinsic? Expert: Precisely. Intrinsic motivation—the internal drive from feeling challenged and a sense of accomplishment—was found to directly enhance learning outcomes. Students learned the material better because they enjoyed the puzzle. Host: And extrinsic motivation? The external rewards? Expert: That’s things like leaderboards and points. The study found that this type of motivation, driven by competition, had a huge impact on increasing students' interest in pursuing a career in cybersecurity. Host: That’s a fascinating distinction. So one drives learning, the other drives career interest. What did the students themselves say made the gamified labs so much more engaging? Expert: From the interviews, three things really stood out. First, instant feedback. Knowing immediately if they solved a challenge correctly was highly rewarding. Second, the use of story-driven scenarios. It made the tasks feel like real-world problems, not just abstract exercises. And third, breaking down complex topics into clear, step-by-step instructions. It made difficult concepts much less intimidating. Host: This is all incredibly insightful. Let’s get to the bottom line: why does this matter for business? What are the key takeaways for leaders and managers? Expert: This is the most important part. For any business struggling with the cybersecurity skills gap, this study provides a clear, evidence-based path forward. Host: So, what’s the first step? Expert: Acknowledge that gamification is not just about making training 'fun'; it's a powerful tool for building your talent pipeline. By incorporating competitive elements, you can actively spark career interest and identify promising internal candidates you didn't know you had. Host: And for designing the training itself? Expert: The takeaway is that design is everything. Corporate training programs should use realistic, story-driven scenarios to bridge the gap between theory and practice. Provide instant feedback mechanisms and break down complex tasks into manageable challenges. This fosters deeper learning and real, applicable skills. Host: It sounds like it helps create the on-the-job experience that hiring managers are looking for. Expert: Exactly. Finally, businesses need to understand that motivation isn't one-size-fits-all. The most effective training programs will offer a blend of challenges that appeal to intrinsic learners and competitive elements that engage extrinsic learners. It’s about creating a rich, diverse learning environment. Host: Fantastic. So, to summarize for our listeners: the cybersecurity skills gap is a serious business threat, but this study shows that well-designed gamified training is a proven strategy to fight it. It improves learning, boosts both intrinsic and extrinsic motivation, and can directly help build a stronger talent pipeline. Host: Alex, thank you so much for breaking down this complex study into such clear, actionable insights. Expert: My pleasure, Anna. Host: And thank you for tuning in to A.I.S. Insights — powered by Living Knowledge.
Communications of the Association for Information Systems (2025)
Conceptualizing IT Artefacts for Policymaking – How IT Artefacts Evolve as Policy Objects
Karin Väyrynen, Sari Laari-Salmela, Netta Iivari, Arto Lanamäki, Marianne Kinnula
This study explores how an information technology (IT) artefact evolves into a 'policy object' during the policymaking process, using a 4.5-year longitudinal case study of the Finnish Taximeter Law. The research proposes a conceptual framework that identifies three forms of the artefact as it moves through the policy cycle: a mental construct, a policy text, and a material IT artefact. This framework helps to understand the dynamics and challenges of regulating technology.
Problem
While policymaking related to information technology is increasingly significant, the challenges stemming from the complex, multifaceted nature of IT are poorly understood. There is a specific gap in understanding how real-world IT artefacts are translated into abstract policy texts and how those texts are subsequently reinterpreted back into actionable technologies. This 'translation' process often leads to ambiguity and unintended consequences during implementation.
Outcome
- Proposes a novel conceptual framework for understanding the evolution of an IT artefact as a policy object during a public policy cycle. - Identifies three distinct forms the IT artefact takes: 1) a mental construct in the minds of policymakers and stakeholders, 2) a policy text such as a law, and 3) a material IT artefact as a real-world technology that aligns with the policy. - Highlights the significant challenges in translating complex real-world technologies into abstract legal text and back again, which can create ambiguity and implementation difficulties. - Distinguishes between IT artefacts at the policy level and IT artefacts as real-world technologies, showing how they evolve on separate but interconnected tracks.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. In a world of fast-paced tech innovation, how do laws and policies keep up? Today, we're diving into a fascinating study that unpacks this very question. It's titled "Conceptualizing IT Artefacts for Policymaking – How IT Artefacts Evolve as Policy Objects".
Host: With me is our analyst, Alex Ian Sutherland. Alex, this study looks at how a piece of technology becomes something that policymakers can actually regulate. Why is that important?
Expert: It's crucial, Anna. Technology is complex and multifaceted, but laws are abstract text. The study explores how an IT product evolves as it moves through the policy cycle, using a real-world example of the Finnish Taximeter Law. It shows how challenging, and important, it is to get that translation right.
Host: Let's talk about that challenge. What is the big problem this study addresses?
Expert: The core problem is that policymakers often struggle to understand the technology they're trying to regulate. There's a huge gap in understanding how a real-world IT product, like a ride-sharing app, gets translated into abstract policy text, and then how that text is interpreted back into a real, functioning technology.
Host: So it's a translation issue, back and forth?
Expert: Exactly. And that translation process is full of pitfalls. The study followed the Finnish government's attempt to update their taximeter law. The old law only allowed certified, physical taximeters. But with the rise of apps like Uber, they needed a new law to allow "other devices or systems". The ambiguity in how they wrote that new law created a lot of confusion and unintended consequences.
Host: How did the researchers go about studying this problem?
Expert: They took a very in-depth approach. It was a 4.5-year longitudinal case study. They analyzed over a hundred documents—draft laws, stakeholder statements, meeting notes—and conducted dozens of interviews with regulators, tech providers, and taxi federations. They watched the entire policy cycle unfold in real time.
Host: And after all that research, what were the key findings? What did they learn about how technology evolves into a "policy object"?
Expert: They developed a fantastic framework that identifies three distinct forms the technology takes. First, it exists as a 'mental construct' in the minds of policymakers. It's their idea of what the technology is—for instance, "an app that can calculate a fare".
Host: Okay, so it starts as an idea. What's next?
Expert: That idea is translated into a 'policy text' – the actual law or regulation. This is where it gets tricky. The Finnish law described the new technology based on certain functions, like measuring time and distance to a "corresponding level" of accuracy as a physical taximeter.
Host: That sounds a little vague.
Expert: It was. And that leads to the third form: the 'material IT artefact'. This is the real-world technology that companies build to comply with the law. Because the policy text was ambiguous, a whole range of technologies appeared. Some were sophisticated ride-hailing platforms, but others were just uncertified apps or devices bought online that technically met the vague definition. The study shows these three forms evolve on separate but connected tracks.
Host: This is the critical part for our listeners, Alex. Why does this matter for business leaders and tech innovators today?
Expert: It matters immensely, especially with regulations like the new European AI Act on the horizon. That Act defines what an "AI system" is. That definition—that 'policy text'—will determine whether your company's product is considered high-risk and subject to intense scrutiny and compliance costs.
Host: So, if your product fits the law's definition, you're in a completely different regulatory bracket.
Expert: Precisely. The study teaches us that businesses cannot afford to ignore the policymaking process. You need to engage when the 'mental construct' is being formed, to help policymakers understand the technology's reality. You need to pay close attention to the wording of the 'policy text' to anticipate how it will be interpreted.
Host: And the takeaway for product development?
Expert: Your product—your 'material IT artefact'—exists in the real world, but its legitimacy is determined by the policy world. Businesses must understand that these are two different realms that are often disconnected. The successful companies will be the ones that can bridge that gap, ensuring their innovations align with policy, or better yet, help shape sensible policy from the start.
Host: So, to recap: technology in the eyes of the law isn't just one thing. It's an idea in a regulator's mind, it's the text of a law, and it's the actual product in the market. Understanding how it transforms between these states is vital for navigating the modern regulatory landscape.
Host: Alex, thank you for breaking that down for us. It’s a powerful lens for viewing the intersection of tech and policy.
Expert: My pleasure, Anna.
Host: And thank you to our audience for tuning into A.I.S. Insights. Join us next time as we translate more knowledge into action.
IT Artefact, IT Regulation, Law, Policy Object, Policy Cycle, Public Policymaking, European Al Act
Communications of the Association for Information Systems (2025)
The Digital Language of Emotion: Cautions and Solutions for Strategic Use of Emoji in Responding Information System Incidents
Soojin Roh, Shubin Yu
This paper investigates if, when, and how organizations can strategically use emojis in online communications when responding to information system (IS) incidents. Through three experimental studies conducted with Chinese and U.S. participants, the research examines how cultural context, the source of the message (CEO vs. company account), and incident type influence public perception.
Problem
As companies increasingly use emojis in professional communications, there is a risk of missteps, especially in crisis situations. A lack of understanding of how emojis shape public perception across different cultures can lead to reputational harm, and existing research lacks empirical evidence on their strategic and cross-cultural application in responding to IS incidents.
Outcome
- For Chinese audiences, using emojis in IS incident responses is generally positive, as it reduces psychological distance, alleviates anger, and increases perceptions of warmth and competence. - The positive effect of emojis in China is stronger when used by an official company account rather than a CEO, and when the company is responsible for the incident. - In contrast, U.S. audiences tend to evaluate the use of emojis negatively in incident responses. - The negative perception among U.S. audiences is particularly strong when a CEO uses an emoji to respond to an internally-caused incident, leading to increased anger and perceptions of incompetence.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. Today, we're discussing a communication tool we all use daily: the emoji. But what happens when it enters the high-stakes world of corporate crisis management? Host: We're diving into a fascinating new study titled "The Digital Language of Emotion: Cautions and Solutions for Strategic Use of Emoji in Responding Information System Incidents". Host: It investigates if, when, and how organizations can strategically use emojis in online communications when responding to information system incidents, like a data breach or a server crash. I'm your host, Anna Ivy Summers, and joining me is our expert analyst, Alex Ian Sutherland. Expert: Great to be here, Anna. Host: Alex, companies are trying so hard to be relatable on social media. What's the big problem with using a simple emoji when things go wrong? Expert: The problem is that it's a huge gamble without a clear strategy. As companies increasingly use emojis, there's a serious risk of missteps, especially in a crisis. Expert: A lack of understanding of how emojis shape public perception, particularly across different cultures, can lead to significant reputational harm. An emoji meant to convey empathy could be seen as unprofessional or insincere, and there's been very little research to guide companies on this. Host: So it's a digital communication minefield. How did the researchers approach this problem? Expert: They conducted a series of three carefully designed experiments with participants from two very different cultures: China and the United States. Expert: They created realistic crisis scenarios—like a ride-hailing app crashing or a company mishandling user data. Participants were then shown mock social media responses to these incidents. Expert: The key variables were whether the message included an emoji, if it came from the official company account or the CEO, and whether the company was at fault. They then measured how people felt about the company's response. Host: A very thorough approach. Let's get to the results. What were the key findings? Expert: The findings were incredibly clear, and they showed a massive cultural divide. For Chinese audiences, using emojis in a crisis response was almost always viewed positively. Expert: It was found to reduce the psychological distance between the public and the company. This helped to alleviate anger and actually increased perceptions of the company's warmth *and* its competence. Host: That’s surprising. So in China, it seems to be a smart move. I'm guessing the results were different in the U.S.? Expert: Completely different. U.S. audiences consistently evaluated the use of emojis in crisis responses negatively. It didn't build a bridge; it often damaged the company's credibility. Host: Was there a specific scenario where it was particularly damaging? Expert: Yes, the worst combination was a CEO using an emoji to respond to an incident that was the company's own fault. This led to a significant increase in public anger and a perception that the CEO, and by extension the company, was incompetent. Host: That’s a powerful finding. This brings us to the most important question for our listeners: why does this matter for business? Expert: The key takeaway is that your emoji strategy must be culturally intelligent. There is no global, one-size-fits-all rule. Expert: For businesses communicating with a Chinese audience, a well-chosen emoji can be a powerful tool. It's seen as an important non-verbal cue that shows sincerity and a commitment to maintaining the relationship, even boosting perceptions of competence when you're admitting fault. Host: So for Western audiences, the advice is to steer clear? Expert: For the most part, yes. In a low-context culture like the U.S., the public expects directness and professionalism in a crisis. An emoji can trivialize a serious event. Expert: If your company is at fault, and especially if the message is from a leader like the CEO, avoid emojis. The risk of being perceived as incompetent and making customers even angrier is just too high. The focus should be on action and clear communication, not on emotional icons. Host: So, to summarize: when managing a crisis, know your audience. For Chinese markets, an emoji can be an asset that humanizes your brand. For U.S. markets, it can be a liability that makes you look foolish. Context is truly king. Host: Alex Ian Sutherland, thank you for sharing these crucial insights with us today. Expert: My pleasure, Anna. Host: And thank you for listening to A.I.S. Insights. Join us next time for more on the intersection of business and technology.
Emoji, Information System Incident, Social Media, Psychological Distance, Warmth, Competence
Communications of the Association for Information Systems (2025)
Fostering Group Work in Virtual Reality Environments: Is Presence Enough?
Ayushi Tandon, Yogini Joglekar, Sabra Brock
This study investigates how working in Virtual Reality (VR) affects group collaboration in a professional development setting. Using Construal Level Theory as a framework, the research qualitatively analyzed the experiences of participants in a VR certification course to understand how feelings of spatial, social, and temporal presence impact group dynamics.
Problem
Most research on Virtual Reality has focused on its benefits for individual users in fields like gaming and healthcare. There is a significant gap in understanding how VR technology facilitates or hinders collaborative group work, especially as remote and hybrid work models become more common in professional settings.
Outcome
- A heightened sense of 'spatial presence' (feeling physically there) in VR positively improves group communication, collaboration, and overall performance. - 'Social presence' (feeling connected to others) in VR also enhances group cohesion and effectiveness at both immediate (local) and long-term (global) levels. - The experience of 'temporal presence' (how time is perceived) in VR, which can feel distorted, positively influences immediate group coordination and collaboration. - The effectiveness of VR for group work is significantly influenced by 'task-technology fit'; the positive effects of presence are stronger when VR's features are well-suited to the group's task.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. In a world of remote and hybrid work, we're all looking for better ways to connect and collaborate. Today, we're diving into the world of Virtual Reality to see if it holds the key. I’m your host, Anna Ivy Summers. Host: With me is our analyst, Alex Ian Sutherland, who has been digging into a fascinating new study on this very topic. Welcome, Alex. Expert: Great to be here, Anna. Host: The study is titled "Fostering Group Work in Virtual Reality Environments: Is Presence Enough?". In a nutshell, it investigates how working in VR affects group collaboration and how that feeling of ‘being there’ really impacts team dynamics. Expert: Exactly. It's about moving beyond the hype and understanding what really happens when teams put on the headsets. Host: So Alex, let’s start with the big picture. We have tools like Zoom and Teams. Why is there a need to even explore VR for group work? What’s the problem this study is trying to solve? Expert: The core problem is that while VR is booming for individual uses like gaming or specialized training, there's a huge gap in our understanding of how it works for teams. Expert: We know 2D video calls can lead to fatigue and a sense of disconnection. The big question the researchers asked was: can VR bridge that gap? Does the immersive feeling of 'presence' that VR creates actually translate into better group performance, or is it just a novelty? Host: A very relevant question for any business with a distributed team. So, how did the researchers go about finding an answer? Expert: They took a really practical approach. They studied several groups of professionals who were taking part in a VR instructor certification course. Over several weeks, they observed these teams working together on projects inside a virtual campus, collecting data from recordings, participant reflections, and focus groups. Expert: This allowed them to see beyond a one-off experiment and understand how team dynamics evolved over time in a realistic professional development setting. Host: It sounds very thorough. So, after all that observation, what were the key findings? Is presence enough to improve group work? Expert: The findings are nuanced but incredibly insightful. The study breaks "presence" down into three types, and each has a different impact. Expert: First, there’s 'spatial presence'—the feeling of physically being in the virtual space. The study found this is a huge positive. When teams feel like they're actually in the same room, sharing a space, it significantly improves communication and collaboration. Host: So it’s more than just seeing your colleagues on a screen; it's about your brain believing you're sharing a physical environment with them. Expert: Precisely. The second type is 'social presence'—that feeling of being connected to others. In VR, this was enhanced through shared experiences and even the use of avatars, which can make people feel more comfortable giving honest feedback. This directly boosted group cohesion and trust. Host: That’s interesting. And what was the third type of presence? Expert: That would be 'temporal presence,' or how we perceive time. Participants in VR often experienced a "time warp," where they'd lose track of real-world time and become deeply focused on the task at hand. This helped immediate coordination, especially for teams spread across different time zones. Expert: But there’s a crucial catch to all of this, which was the study’s most important finding: task-technology fit. Host: Task-technology fit. What does that mean in this context? Expert: It means VR is not a silver bullet. The positive effects of presence are only strong when the task is actually suited for VR. For creative brainstorming or hands-on simulations, it's fantastic. But for tasks that require heavy note-taking or documentation, it's inefficient because you have to constantly switch in and out of the headset. Host: This is the critical part for our listeners. Let's translate this into action. What are the key business takeaways from this study? Expert: I see three major ones. First, rethink your training and onboarding. VR offers an unparalleled way to create immersive simulations for everything from complex technical skills to soft skills like empathy training for new managers. It can make remote new hires feel truly part of the team from day one. Expert: Second, it can supercharge collaboration for global teams. For those crucial, high-stakes brainstorming or problem-solving sessions, VR can bridge geographical distance in a way video calls simply can't, fostering a real sense of shared purpose. One participant working with colleagues in India and California said they "met with really no distance amongst us." Host: That’s a powerful testament. And the third takeaway? Expert: Be strategic. Don’t invest in VR for the sake of it. Understand its strengths and weaknesses. Use it for immersive, collaborative experiences that play to its strengths. For a quick status update or writing a report, traditional tools are still more efficient. The key is to choose the right tool for the job. Host: So, in summary: Virtual Reality can be a powerful tool to foster genuine connection and collaboration in distributed teams, largely because of that heightened sense of presence. Host: But it's not a one-size-fits-all solution. The real magic happens when the immersive capabilities of the technology are perfectly matched to the team's task. Host: Alex, thank you for breaking down this complex topic into such clear, actionable insights. Expert: My pleasure, Anna. Host: And thank you to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we continue to explore the intersection of business and technology.
Communications of the Association for Information Systems (2024)
Frugal Fintech Ecosystem Development: A Resource Orchestration Perspective
Prakash Dhavamani, Barney Tan, Daniel Gozman, Leben Johnson
This study investigates how a financial technology (Fintech) ecosystem was successfully established in a resource-constrained environment, using the Vizag Fintech Valley in India as a case study. The research examines the specific processes of gathering resources, building capabilities, and creating market value under significant budget limitations. It proposes a practical framework to guide the development of similar 'frugal' innovation hubs in other developing regions.
Problem
There is limited research on how to launch and develop a Fintech ecosystem, especially in resource-scarce developing countries where the potential benefits like financial inclusion are greatest. Most existing studies focus on developed nations, and their findings are not easily transferable to environments with tight budgets, a lack of specialized talent, and less mature infrastructure. This knowledge gap makes it difficult for policymakers and entrepreneurs to create successful Fintech hubs in these regions.
Outcome
- The research introduces a practical framework for building Fintech ecosystems in resource-scarce settings, called the Frugal Fintech Ecosystem Development (FFED) framework. - The framework identifies three core stages: Structuring (gathering and prioritizing available resources), Bundling (combining resources to build capabilities), and Leveraging (using those capabilities to seize market opportunities). - It highlights five key sub-processes for success in a frugal context: bricolaging (creatively using resources at hand), prioritizing, emulating (learning from established ecosystems), extrapolating, and sandboxing (safe, small-scale experimentation). - The study shows that by orchestrating resources effectively, even frugal ecosystems can achieve outcomes comparable to those in well-funded regions, a concept termed 'equifinality'. - The findings offer an evidence-based guide for policymakers to design regulations and support models that foster sustainable Fintech growth in developing economies.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. In today's interconnected world, innovation hubs are seen as engines of economic growth. But can you build one without massive resources? That's the question at the heart of a fascinating study we're discussing today titled, "Frugal Fintech Ecosystem Development: A Resource Orchestration Perspective".
Host: It investigates how a financial technology, or Fintech, ecosystem was successfully built in a resource-constrained environment in India, proposing a framework that could be a game-changer for developing regions. Here to break it down for us is our analyst, Alex Ian Sutherland. Welcome, Alex.
Expert: Thanks for having me, Anna.
Host: Alex, let's start with the big picture. What's the real-world problem this study is trying to solve?
Expert: The core problem is a major knowledge gap. Everyone talks about the potential of Fintech to drive financial inclusion and economic growth, especially in developing countries. But almost all the research and successful models we have are from well-funded, developed nations like the US or the UK.
Host: And those models don't just copy and paste into a different environment.
Expert: Exactly. A region with a tight budget, a shortage of specialized talent, and less mature infrastructure can't follow the Silicon Valley playbook. The study points out that Fintech startups already have a shockingly high failure rate—around 90% in their first six years. In a resource-scarce setting, that risk is even higher. So, policymakers and entrepreneurs in these areas were essentially flying blind.
Host: So how did the researchers approach this challenge? How did they figure out what a successful frugal model looks like?
Expert: They went directly to the source. They conducted a deep-dive case study of the Vizag Fintech Valley in India. This was a city that, despite significant financial constraints, managed to build a vibrant and successful Fintech hub. The researchers interviewed 26 key stakeholders—everyone from government regulators and university leaders to startup founders and investors—to piece together the story of exactly how they did it.
Host: It sounds like they got a 360-degree view. What were the key findings that came out of this investigation?
Expert: The main output is a practical guide they call the Frugal Fintech Ecosystem Development, or FFED, framework. It breaks the process down into three core stages: Structuring, Bundling, and Leveraging.
Host: Let's unpack that. What happens in the 'Structuring' stage?
Expert: Structuring is all about gathering the resources you have, not the ones you wish you had. In Vizag, this meant repurposing unused land for infrastructure and bringing in a leadership team that had already successfully built a tech hub in a nearby city. It’s about being resourceful from day one.
Host: Okay, so you've gathered your parts. What is 'Bundling'?
Expert: Bundling is where you combine those parts to create real capabilities. For example, Vizag’s leaders built partnerships between universities and companies to train a local, skilled workforce. They connected startups in incubation hubs so they could learn from each other. They were actively building the engine of the ecosystem.
Host: Which brings us to 'Leveraging'. I assume that's when the engine starts to run?
Expert: Precisely. Leveraging is using those capabilities to seize market opportunities and create value. A key part of this was a concept the study highlights called 'sandboxing'.
Host: Sandboxing? That sounds intriguing.
Expert: It's essentially creating a safe, controlled environment where Fintech firms can experiment with new technologies on a small scale. Regulators in Vizag allowed startups to test blockchain solutions for government services, for instance. This lets them prove their concept and work out the kinks without huge risk, which is critical when you can't afford big failures.
Host: That makes perfect sense. Alex, this is the most important question for our audience: Why does this matter for business? What are the practical takeaways?
Expert: This is a playbook for smart, sustainable growth. For policymakers in emerging economies, it shows you don't need a blank check to foster innovation. The focus should be on orchestrating resources—connecting academia with industry, creating mentorship networks, and enabling safe experimentation.
Host: And for entrepreneurs or investors?
Expert: For entrepreneurs, the message is that resourcefulness trumps resources. This study proves you can build a successful company outside of a major, well-funded hub by creatively using what's available locally. For investors, it's a clear signal to look for opportunities in these frugal ecosystems. Vizag attracted over 900 million dollars in investment in its first year. That shows that effective organization and a frugal mindset can generate returns just as impressive as those in well-funded regions. The study calls this 'equifinality'—the idea that you can reach the same successful outcome through a different, more frugal path.
Host: So, to sum it up: building a thriving tech hub on a budget isn't a fantasy. By following a clear framework of structuring, bundling, and leveraging resources, and by using clever tactics like sandboxing, regions can create their own success stories.
Expert: That's it exactly. It’s a powerful and optimistic model for global innovation.
Host: A fantastic insight. Thank you so much for your time and expertise, Alex.
Expert: My pleasure, Anna.
Host: And thanks to all our listeners for tuning into A.I.S. Insights. Join us next time as we continue to explore the ideas shaping business and technology.
Fintech Ecosystem, India, Frugal Innovation, Resource Orchestration, Case Study
Communications of the Association for Information Systems (2024)
Antecedents of User Experience in the Immersive Metaverse Ecosystem: Insights from Mining User Reviews
Bibaswan Basu, Arpan K. Kar, Sagnika Sen
This study analyzes over 400,000 user reviews from 14 metaverse applications on the Google Play Store to identify the key factors that influence user experience. Using topic modeling, text analytics, and established theories like Cognitive Load Theory (CLT) and Cognitive Absorption Theory (CAT), the researchers developed and empirically validated a comprehensive framework. The goal was to understand what makes these immersive virtual environments engaging and satisfying for users.
Problem
While the metaverse is a rapidly expanding technology with significant business potential, there is a lack of large-scale, empirical research identifying the specific factors that shape a user's experience. Businesses and developers need to understand what drives user satisfaction to create more immersive and successful platforms. This study addresses this knowledge gap by moving beyond theoretical discussions to analyze actual user feedback.
Outcome
- Factors that positively influence user experience include sociability (social interactions), optimal user density, telepresence (feeling present in the virtual world), temporal dissociation (losing track of time), focused immersion, heightened enjoyment, curiosity, and playfulness. - These findings suggest that both the design of the virtual environment (CLT factors) and the user's psychological engagement (CAT factors) are crucial for a positive experience. - Contrary to the initial hypothesis, platform stability was negatively associated with user experience, possibly because too much familiarity can lead to a lack of diversity and novelty. - The study did not find a significant link between interactivity and social presence with user experience in its final models, suggesting other elements are more impactful.
Host: Welcome to A.I.S. Insights, the podcast where we connect academic research to real-world business, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we’re diving into the metaverse. Specifically, we're looking at a fascinating new study titled "Antecedents of User Experience in the Immersive Metaverse Ecosystem: Insights from Mining User Reviews". Host: The researchers analyzed over 400,000 user reviews from 14 different metaverse apps to figure out, with hard data, what actually makes these virtual worlds engaging and satisfying for users. Host: With me to unpack this is our analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: So Alex, companies are pouring billions into the metaverse, but it often feels like they're guessing what users want. What's the big problem this study is trying to solve? Expert: You've hit it exactly. The metaverse market is projected to be worth over 1.5 trillion dollars by 2030, yet there's a huge knowledge gap. Most discussions about user experience are theoretical. Expert: Businesses lack large-scale, empirical data on what truly drives user satisfaction. This study addresses that by moving past theory and analyzing what hundreds of thousands of users are actually saying in their own words. It provides a data-driven roadmap. Host: So instead of guessing, they went straight to the source. How did they approach analyzing such a massive amount of feedback? Expert: It was a really clever, multi-step process. First, they collected all those reviews from the Google Play Store. Then, they used powerful text-mining algorithms. Expert: Think of it as a super-smart assistant that reads every single review and identifies the core themes people are talking about—things like social features, performance, or the feeling of immersion. Expert: They then used established psychological theories to organize these themes into a comprehensive framework and statistically tested which factors had the biggest impact on a user's star rating. Host: So it’s a very rigorous approach. After all that analysis, what were the key findings? What are the secret ingredients for a great metaverse experience? Expert: The positive ingredients were quite clear. Things like sociability—the ability to have meaningful interactions with others—was a huge driver of positive experiences. Expert: Also, factors that create a deep sense of immersion were critical. This includes telepresence, which is that feeling of truly being present in the virtual world, and what the researchers call temporal dissociation—when you're so engaged you lose track of time. Expert: And of course, heightened enjoyment, curiosity, and playfulness were key. The platform has to be fun and intriguing. Host: That makes a lot of sense. Were there any findings that were surprising or counter-intuitive? Expert: Absolutely. Two things stood out. First, platform stability was actually negatively associated with a good user experience. Host: Wait, negative? You mean users don't want a stable, bug-free platform? Expert: It's not that they want bugs. The study suggests that too much stability and familiarity can lead to boredom. Users crave novelty and diversity. A metaverse that never changes becomes stale. They want an evolving world. Expert: The second surprise was that basic interactivity and just having other avatars around, what's called social presence, weren't as significant as predicted. Host: What does that tell us? Expert: It suggests that quality trumps quantity. It’s not enough to just have buttons to press or a crowd of avatars. The experience is driven by the *quality* of the social connections and the *depth* of the immersion, not just the mere existence of these features. Host: This is incredibly valuable. So let's get to the bottom line: Why does this matter for business? What are the key takeaways for anyone building a metaverse experience? Expert: This is the most important part. I see three major takeaways. First, community is king. Businesses must design features that foster high-quality social bonds, not just fill a virtual room with people. Think collaborative projects, shared goals, and tools for genuine communication. Expert: Second, you have to balance stability with novelty. A business needs a content roadmap to constantly introduce new events, items, and experiences. A static world is a dead world in the metaverse. Your platform must feel alive and dynamic. Expert: And third, design for 'flow'. Focus on creating that state where users become completely absorbed. This means intuitive interfaces that reduce mental effort, compelling activities that spark curiosity, and a world that’s simply a joy to be in. Host: Fantastic. So to summarize for our listeners: Focus on building a real community, keep the experience fresh and dynamic to avoid stagnation, and design for that deeply immersive 'flow' state. Host: Alex, this has been incredibly insightful. Thank you for breaking down this complex study into such clear, actionable advice. Expert: My pleasure, Anna. Host: That’s all the time we have for today on A.I.S. Insights, powered by Living Knowledge. Join us next time as we continue to decode the research that's shaping our business and technology landscape. Thanks for listening.
Metaverse, User Experience, Immersive Technology, Virtual Ecosystem, Cognitive Absorption Theory, Big Data Analytics, User Reviews
Communications of the Association for Information Systems (2025)
Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains
Adnan Khan, Syed Hussain Murtaza, Parisa Maroufkhani, Sultan Sikandar Mirza
This study investigates how digital resilience enhances the adoption of AI and Internet of Things (IoT) practices within the supply chains of high-tech small and medium-sized enterprises (SMEs). Using survey data from 293 Chinese high-tech SMEs, the research employs partial least squares structural equation modeling to analyze the impact of these technologies on sustainable supply chain performance.
Problem
In an era of increasing global uncertainty and supply chain disruptions, businesses, especially high-tech SMEs, struggle to maintain stability and performance. There is a need to understand how digital technologies can be leveraged not just for efficiency, but to build genuine resilience that allows firms to adapt to and recover from shocks while maintaining sustainability.
Outcome
- Digital resilience is a crucial driver for the adoption of both IoT-oriented supply chain practices and AI-driven innovative practices. - The implementation of IoT and AI practices, fostered by digital resilience, significantly improves sustainable supply chain performance. - AI-driven practices were found to be particularly vital for resource optimization and predictive analytics, strongly influencing sustainability outcomes. - The effectiveness of digital resilience in promoting IoT adoption is amplified in dynamic and unpredictable market environments.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Today, we're diving into a fascinating new study titled "Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains."
Host: In simple terms, this study looks at how being digitally resilient helps smaller high-tech companies adopt AI and the Internet of Things, or IoT, in their supply chains, and what that means for their long-term sustainable performance. Here to break it all down is our analyst, Alex Ian Sutherland. Welcome, Alex.
Expert: Thanks for having me, Anna.
Host: Alex, let's start with the big picture. We hear a lot about supply chain disruptions. What is the specific problem this study is trying to solve?
Expert: The core problem is that global uncertainty is the new normal. We’ve seen it with the pandemic, with geopolitical conflicts, and even cybersecurity threats. These events create massive shocks to supply chains.
Host: And this is especially tough on smaller companies, right?
Expert: Exactly. High-tech Small and Medium-sized Enterprises, or SMEs, often lack the resources of larger corporations. They struggle to maintain stability and performance when disruptions hit. The old "just-in-time" model, which prioritized efficiency above all, proved to be very fragile. So, the question is no longer just about being efficient; it’s about being resilient.
Host: The study uses the term "digital resilience." What does that mean in this context?
Expert: Digital resilience is a company's ability to use technology not just to operate, but to absorb shocks, adapt to disruptions, and recover quickly. It’s about building a digital foundation that is fundamentally flexible and strong.
Host: So how did the researchers go about studying this? What was their approach?
Expert: They conducted a survey with 293 high-tech SMEs in China that were already using AI and IoT technologies in their supply chains. This is important because it means they were analyzing real-world applications, not just theories. They then used advanced statistical analysis to map out the connections between digital resilience, the use of AI and IoT, and overall performance.
Host: A practical approach for a practical problem. Let's get to the results. What were the key findings?
Expert: There were a few really powerful takeaways. First, digital resilience is the critical starting point. The study found that companies with a strong foundation of digital resilience were far more successful at implementing both IoT-oriented practices, like real-time asset tracking, and innovative AI-driven practices.
Host: So, resilience comes first, then the technology adoption. And does that adoption actually make a difference?
Expert: It absolutely does. That’s the second key finding. When that resilience-driven adoption of AI and IoT happens, it significantly boosts what the study calls sustainable supply chain performance. This isn't just about profits; it means the supply chain becomes more reliable, efficient, and environmentally responsible.
Host: Was there a difference in the impact between AI and IoT?
Expert: Yes, and this was particularly interesting. While both were important, the study found that AI-driven practices were especially vital for achieving those sustainability outcomes. This is because AI excels at things like resource optimization and predictive analytics—it can help a company see a problem coming and adjust before it hits.
Host: And what about the business environment? Does that play a role?
Expert: A huge role. The final key insight was that in highly dynamic and unpredictable markets, the value of digital resilience is amplified. Specifically, it becomes even more crucial for driving the adoption of IoT. When things are chaotic, the ability to get real-time data from IoT sensors and devices becomes a massive strategic advantage.
Host: This is where it gets really crucial for our listeners. If I'm a business leader, what is the main lesson I should take from this study?
Expert: The single most important takeaway is to shift your mindset. Stop viewing digital tools as just a way to cut costs or improve efficiency. Start viewing them as the core of your company's resilience strategy. It’s not about buying software; it's about building the strategic capability to anticipate, respond, and recover from shocks.
Host: So it's about moving from a defensive posture to an offensive one?
Expert: Precisely. IoT gives you unprecedented, real-time visibility across your entire supply chain. You know where your materials are, you can monitor production, you can track shipments. Then, AI takes that firehose of data and turns it into intelligent action. It helps you make smarter, predictive decisions. The combination creates a supply chain that isn't just tough—it's intelligent.
Host: So, in today's unpredictable world, this isn't just a nice-to-have, it's a competitive necessity.
Expert: It is. In a volatile market, the ability to adapt faster than your competitors is what separates the leaders from the laggards. For an SME, leveraging AI and IoT this way can level the playing field, allowing them to be just as agile, if not more so, than much larger rivals.
Host: Fantastic insights. To summarize for our audience: Building a foundation of digital resilience is the key first step. This resilience enables the powerful adoption of AI and IoT, which in turn drives a stronger, smarter, and more sustainable supply chain. And in our fast-changing world, that capability is what truly defines success.
Host: Alex Ian Sutherland, thank you so much for your time and for making this research so accessible.
Expert: My pleasure, Anna.
Host: And thank you to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. We'll see you next time.
Digital Resilience, Internet of Things-Oriented Supply Chain Management Practices, AI-Driven Innovative Practices, Supply Chain Dynamism, Sustainable Supply Chain Performance
Journal of the Association for Information Systems (2026)
Affordance-Based Pathway Model of Social Inclusion: A Case Study of Virtual Worlds and People With Lifelong Disability
Karen Stendal, Maung K. Sein, Devinder Thapa
This study explores how individuals with lifelong disabilities (PWLD) use virtual worlds, specifically Second Life, to achieve social inclusion. Using a qualitative approach with in-depth interviews and participant observation, the researchers analyzed how PWLD experience the platform's features. The goal was to develop a model explaining the process through which technology facilitates greater community participation and interpersonal connection for this marginalized group.
Problem
People with lifelong disabilities often face significant social isolation and exclusion due to physical, mental, or sensory impairments that hinder their full participation in society. This lack of social connection can negatively impact their psychological and emotional well-being. This research addresses the gap in understanding the specific mechanisms by which technology, like virtual worlds, can help this population move from isolation to inclusion.
Outcome
- Virtual worlds offer five key 'affordances' (action possibilities) that empower people with lifelong disabilities (PWLD). - Three 'functional' affordances were identified: Communicability (interacting without barriers like hearing loss), Mobility (moving freely without physical limitations), and Personalizability (controlling one's digital appearance and whether to disclose a disability). - These functional capabilities enable two 'social' affordances: Engageability (the ability to join in social activities) and Self-Actualizability (the ability to realize one's potential and help others). - The study proposes an 'Affordance-Based Pathway Model' which shows how using these features helps PWLD build interpersonal relationships and participate in communities, leading to social inclusion.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers, and with me today is our expert analyst, Alex Ian Sutherland. Host: Alex, today we're diving into a fascinating study from the Journal of the Association for Information Systems titled, "Affordance-Based Pathway Model of Social Inclusion: A Case Study of Virtual Worlds and People With Lifelong Disability". Host: In short, it explores how people with lifelong disabilities use virtual worlds, like the platform Second Life, to achieve social inclusion and build community. Host: So, Alex, before we get into the virtual world, let's talk about the real world. What is the core problem this study is trying to address? Expert: Anna, it addresses a significant challenge. People with lifelong disabilities often face profound social isolation. Physical, mental, or sensory barriers can prevent them from fully participating in society, which in turn impacts their psychological and emotional well-being. Expert: While we know technology can help, there’s been a gap in understanding the specific mechanisms—the 'how'—technology can create a pathway from isolation to inclusion for this group. Host: It sounds like a complex challenge to study. So how did the researchers approach this? Expert: They took a very human-centered approach. They went directly into the virtual world of Second Life and conducted in-depth interviews and participant observations with 18 people with lifelong disabilities. This allowed them to understand the lived experiences of both new and experienced users. Host: And what did they find? What is it about these virtual worlds that makes such a difference? Expert: They discovered that the platform offers five key 'affordances'—which is simply a term for the action possibilities or opportunities that the technology makes possible for these users. They grouped them into two categories: functional and social. Host: Okay, five key opportunities. Can you break down the first category, the functional ones, for us? Expert: Absolutely. The first three are foundational. There’s 'Communicability'—the ability to interact without barriers. One participant with hearing loss noted that text chat made it easier to interact because they didn't need sign language. Expert: Second is 'Mobility'. This is about moving freely without physical limitations. A participant who uses a wheelchair in real life shared this powerful thought: "In real life I can't dance; here I can dance with the stars." Expert: The third is 'Personalizability'. This is the user's ability to control their digital appearance through an avatar, and importantly, to choose whether or not to disclose their disability. It puts them in control of their identity. Host: So those three—Communicability, Mobility, and Personalizability—are the functional building blocks. How do they lead to actual social connection? Expert: They directly enable the two 'social' affordances. The first is 'Engageability'—the ability to actually join in social activities and be part of a group. Expert: This then leads to the final and perhaps most profound affordance: 'Self-Actualizability'. This is the ability to realize one's potential and contribute to the well-being of others. For example, a retired teacher in the study found new purpose in helping new users get started on the platform. Host: This is incredibly powerful on a human level. But Alex, this is a business and technology podcast. What are the practical takeaways here for business leaders? Expert: This is where it gets very relevant. First, for any company building in the metaverse or developing collaborative digital platforms, this study is a roadmap for truly inclusive design. It shows that you need to intentionally design for features that enhance communication, freedom of movement, and user personalization. Host: So it's a model for product development in these new digital spaces. Expert: Exactly. And it also highlights an often-overlooked user base. Designing for inclusivity isn't just a social good; it opens up your product to a massive global market. Businesses can also apply these principles internally to create more inclusive remote work environments, ensuring employees with disabilities can fully participate in digital collaboration and company culture. Host: That’s a fantastic point about corporate applications. Is there anything else? Expert: Yes, and this is a critical takeaway. The study emphasizes that technology alone is not a magic bullet. The users succeeded because of what the researchers call 'facilitating conditions'—things like peer support, user training, and community helpers. Expert: For businesses, the lesson is clear: you can't just launch a product. You need to build and foster the support ecosystem and the community around it to ensure users can truly unlock its value. Host: Let’s recap then. Virtual worlds can be a powerful tool for social inclusion by providing five key opportunities: three functional ones that enable two social ones. Host: And for businesses, the key takeaways are to design intentionally for inclusivity, recognize this valuable user base, and remember to build the support system, not just the technology itself. Host: Alex Ian Sutherland, thank you for breaking this down for us. It’s a powerful reminder that technology is ultimately about people. Host: And thank you to our audience for tuning into A.I.S. Insights — powered by Living Knowledge.
Social Inclusion, Virtual Worlds (VW), People With Lifelong Disability (PWLD), Affordances, Second Life, Assistive Technology, Qualitative Study