Unstructured text data, such as emails, blogs, contracts, academic publications, organizational documents, transcribed interviews, and even tweets, are important sources of data in Information ...Systems research. Various forms of qualitative analysis of the content of these data exist and have revealed important insights. Yet, to date, these analyses have been hampered by limitations of human coding of large data sets, and by bias due to human interpretation. In this paper, we compare and combine two quantitative analysis techniques to demonstrate the capabilities of computational analysis for content analysis of unstructured text. Specifically, we seek to demonstrate how two quantitative analytic methods, viz., Latent Semantic Analysis and data mining, can aid researchers in revealing core content topic areas in large (or small) data sets, and in visualizing how these concepts evolve, migrate, converge or diverge over time. We exemplify the complementary application of these techniques through an examination of a 25-year sample of abstracts from selected journals in Information Systems, Management, and Accounting disciplines. Through this work, we explore the capabilities of two computational techniques, and show how these techniques can be used to gather insights from a large corpus of unstructured text.
Full text
Available for:
BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
Academic disciplines are often organized according to the behaviors they examine. While most research on a behavior tends to exist within one discipline, some behaviors are examined by multiple ...disciplines. Better understanding of behaviors and their relationships should enable knowledge transfer across disciplines and theories, thereby dramatically improving the behavioral knowledge base. We propose a taxonomy built on the World Health Organization's International Classification of Functioning, Disability, and Health (ICF), but design the taxonomy as a stand-alone extension rather than an improvement to ICF. Behaviors considered important enough to serve as the dependent variable in articles accepted for publication in top journals were extracted from nine different behavioral and social disciplines. A six-step development and validation process was employed, leading to the final taxonomy. A hierarchy of behaviors under the top banner of Engaging in activities/participating, reflective of ICF's D. hierarchy was constructed with eight immediate domains addressing behaviors ranging from learning, exercising, self-care, and substance use. The resulting International Classification of Behaviors (IC-Behavior), provides a behavior taxonomy targeted towards the interdisciplinary integration of nomological networks relevant to behavioral theories. While IC-Behavior has been labeled v.1.0 to communicate that it is by no means an endpoint, it has empirically shown to provide flexibility for the addition of new behaviors and is tested in the health domain.
Full text
Available for:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Our ability to predict, explain, or control sociotechnical realities is being increasingly called into question by unprecedented phenomena in surveillance, in markets, and in other social and ...political domains. The apparatus of research - our current categories, instruments, arguments, and epistemic choices - rely on what is empirically accessible, i.e., on the past. Our research orientation toward the future assumes continuity and the extension of past patterns into a predictable and thus manageable future. In this research, we propose speculative engagement through digital geographies to make visible the processes of technological and cultural reconfiguration that result in unprecedented change. After describing the conception of “the future” in widely used research methods, we describe speculative engagement as a research orientation to disclose new categories, relationships, and values and a commitment to the performative relationships of our current research practices with potential future(s). Digital geographies are internally consistent and coherent worlds that are cognitively plausible but estranging. They are carriers of meaning and culture that underpin a broad class of methods to provide richly experienced “other worlds.” We posit principles for effective digital geographies and provide an illustrative example of a digital human artifact that estranges us from current assumptions. Finally, we argue that our approach enables researchers to engage with the future on its own terms. In this way, researchers, designers, and policy makers can open current practices to new categories, relationships, logics, and values and make visible the unprecedented reconfigurations in which our research is implicated.
Full text
Available for:
CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
Digitally enabled social networks (DESN) are a complex assemblage of engagement, reflection, action, technology, organization and community. DESN create a unique challenge for researchers who aim to ...understand what social networks are, what they can become and what enablers and constraints underlie trajectories of member engagement. As DESN continually evolve, knowing them as stable and reified representations or as mere technology artefacts provides a limited understanding of their complexity and emergent properties. While DESN are, in part, the technology that supports the necessary actions for engagement, they are also the people and behaviours that constitute its community. Through the presentation of new methodological considerations towards Digg, a large DESN, we observe that social networks entail practices of engagement, change and evolution within a DESN community. We reveal how engagement is a communal endeavour and that the clash of socio‐technical trajectories can result in the emergence of new paths of member participation. Our findings demonstrate the potential of netnography and impressionist tales for contributing to the ongoing pluralistic investigations of DESN and also inform research on engagement and community design and change.
Full text
Available for:
BFBNIB, FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
We report a surprising experience with mobile technology: the lead author found herself seeing and acting differently while running over part of her usual running track with the exercise‐tracking ...application ‘Strava’ on her phone, even without focal attention to the app. We apply the method of problematization to a detailed empirical account of this experience, in conjunction with a literature analysis of taken‐for‐granted assumptions underpinning research on ‘mobile technology use’. This reveals that, while the relationship of attention, perception, movement and technology was a key element of the surprise, these themes are not well accounted for in current IS literature. In response, we employ William Gibson's ecological theory of visual perception to reinterpret the empirical account and thereby build a new understanding of the human plus mobile technology that we term moving‐with‐technology. We introduce to IS: moving‐with‐technology as a new analytical perspective; the new phenomena of digital sub‐species, digital‐niches and asynchronous co‐location; and stimulus for new ecologically oriented ‘mobile methods’. Moving‐with‐technology also has practical implications for urban planners who are using data from digital trace‐making tools such as Strava in their decision‐making, thereby generating what we call ecological feedback loops.
Full text
Available for:
BFBNIB, FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
The goal of a review article is to present the current state of knowledge in a research area. Two important initial steps in writing a review article are boundary identification (identifying a body ...of potentially relevant past research) and corpus construction (selecting research manuscripts to include in the review). We present a theory-as-discourse approach, which (1) creates a theory ecosystem of potentially relevant prior research using a citation-network approach to boundary identification; and (2) identifies manuscripts for consideration using machine learning or random selection. We demonstrate an instantiation of the theory as discourse approach through a proof-of-concept, which we call the automated detection of implicit theory (ADIT) technique. ADIT improves performance over the conventional approach as practiced in past technology acceptance model reviews (i.e., keyword search, sometimes manual citation chaining); it identifies a set of research manuscripts that is more comprehensive and at least as precise. Our analysis shows that the conventional approach failed to identify a majority of past research. Like the three blind men examining the elephant, the conventional approach distorts the totality of the phenomenon. ADIT also enables researchers to statistically estimate the number of relevant manuscripts that were excluded from the resulting review article, thus enabling an assessment of the review article's representativeness.
Full text
Available for:
CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
The predominant means by which research becomes visible and accessible to the research community is through publication. Generally, publication requires careful framing of the research in relation to ...existing knowledge. As a contribution to knowledge cannot be self-evident, authors must persuade, through argumentation, the editors, reviewers, and the research community that their work offers a contribution. In Information Systems, the discussion of argumentation is often limited to the logic dimensions of argumentation, namely deductive, inductive, and abductive reasoning. In this paper, we demonstrate that argumentation requires the consideration of three additional dimensions of argumentation: rhetoric, dialectic, and social-institutional. Kuhn’s concept of the disciplinary matrix is introduced as the background toward which a cogent argument is directed and against which contribution is evaluated. We then illustrate the role of argumentation through the example of the seminal paper by Orlikowski and Iacono on the role of IT in Information Systems research. Understanding the importance of argumentation in framing one’s research contribution is critical to authors, editors, and reviewers alike within and beyond Information Systems and its reference disciplines.
In any given year, scholars from computer science, informatics, media studies, engineering, and information systems engage in conversations that impact how we study emerging topics such as AI ethics, ...digital humans, innovation ecosystems, blockchain, and such enduring themes as social media, analytics, collaboration, healthcare, egovernment, energy systems, knowledge management, and software engineering. ...HICCS serves as an important channel for ideas that cross disciplinary boundaries and that have the capacity to spread throughout the global academic community. The editors sought research that aligned with the ethos that problematization is as crucial as problem solving (Getzels, 1982), and that research can be a beginning not an end. ...we hope the papers selected for this special section open intellectual doors and inspire curiosity, new thinking, and active participation. In publishing this special section, the senior editors at JAIS promote the journal's efforts to be "inclusive in its coverage of topics, level and unit of analysis, theory, method, and philosophical and research approaches-reflecting all aspects of information systems research globally.
Full text
Available for:
CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
Full text
Available for:
CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
10.
Rethinking, "Rethinking: Post-Human Boundaries" Orsatti, Jo; Hafermalz, Ella; Hovorka, Dirk S.
ACM SIGMIS Database: the DATABASE for Advances in Information Systems,
11/2016, Volume:
47, Issue:
4
Journal Article
Peer reviewed
Our rejoinder engages with two issues central to Ramiller's orientation to sociomaterial and posthumanism research. The first is the acceptance of pre-given boundaries between self and technology. ...The second is that appropriation of technology is a human accomplishment. In addressing these issues Ramiller presents us with a conundrum, where assumptions and language tug us in two different research directions. For example, by focusing from the outset on appropriation and resistance in terms of users and external systems, Ramiller invites the reader to backslide into the divided world he seeks to move beyond. We argue that framing research with a language of separation undermines the potential insight of a sociomaterial perspective and closes off lines of inquiry. As an alternative we suggest a relational sociomaterial grounding, where the question becomes, how is boundary work carried out and what do these processes include and exclude? We consider how categories (e.g. "new technology", "novice") are performed in practice. We thus show that from a relational view, boundaries take on a different meaning and require us to attune ourselves to the ways in which relationships and categories are (re)configured in practice in important ways. This prompts us to consider the consequences of such categories and what their (re)configurations might be.