This volume presents the proceedings of the bidt "Vectors of Data Disclosure" conference held in Munich 2022. The contributions give interdisciplinary and comparative insights into various factors of ...data disclosure decisions – combining perspectives of law, cultural studies, and business information systems. The volume also condenses results of the corresponding bidt research project on "Vectors of Data Disclosure".
New technologies create novel tensions, such as between providing consumers with greater control over their personal data and enhancing the technological sophistication of firms’ offerings (e.g., ...through automation). Resolving such control-related tensions requires specific, comprehensive conceptualizations and measures of consumers’ perceived data control. Drawing from conceptual notions of control, the authors develop a novel, multistage account of control across consumer–firm data exchanges in various traditional (active and passive) and new, hybrid data disclosure settings. By distinguishing, defining, and operationalizing control activities pertaining to the collection, submission, access, and use of personal data, this article proposes a means to capture consumers’ subjective control perceptions. Study 1, focused on quantitative measure validation, establishes that consumers can distinguish the four data control activities; Study 2, a qualitative account using depth interviews, reveals that consumers identify the four control activities unprompted and across diverse situations. Collectively, these findings present both theoretical and practical implications. This article concludes with a robust set of research directions for an expanded understanding of data control activities in technology-mediated environments.
•Online social networks that rely on secondary data use face a challenging trade-off.•Providers need to evaluate consequences of their privacy policies’ contents.•We integrate conflicting interests ...of providers and users of online social networks.•Privacy policies need to be reconceptualized beyond the e-commerce domain.•Privacy risks transfer the effects of a privacy policy’s contents on user behavior.
Privacy policies determine online social network providers’ options to monetize user data. However, these statements also intrude on users’ privacy and, thus, might reduce their willingness to disclose personal information, which in turn limits the data available for monetization. Given these conflicting interests, we conducted an experimental survey to investigate the relationship between privacy policies and users’ reactions. We show that users’ privacy risk perceptions mediate the effect that changes in policies’ monetization options have on users’ willingness to disclose information. Our findings emphasize privacy policies as a delicate managerial concept for companies relying on data monetization.
Monitoring the complexity of a firm's IT architecture is imperative to ensure a stable and flexible platform foundation for competing in the era of digital business strategy. However, IT architects ...lack IT support for dealing with this important problem. We engaged with five companies in a significant design science research (DSR) program and drew on the heuristic theorizing framework both to solve this problem through evolving IT artifacts and to accumulate nascent design knowledge. We base the design knowledge development on a conceptual framework involving three essential concepts for understanding and solving this problem: structural complexity, dynamic complexity, and problem-solving complexity. Drawing on this foundation, we address the research question: How can IT support be provided for reducing the problem-solving complexity of monitoring the structural and dynamic complexity of IT architectures in the context of a digital business strategy? To answer this question, we present a set of design principles that we derived from our iterative process of IT artifact construction and evaluation activities with five companies. Our nascent design knowledge contributes to the research on IT architecture management in the context of digital business strategy. In addition, we also contribute to the understanding of how, through the use and illustration of the heuristic theorizing framework, design knowledge can be accumulated systematically on the basis of generalization from IT artifact construction and evaluation outcomes generated across multiple contexts and companies.
Decentralized autonomous organizations (DAOs)—collectively owned human-machine systems deployed on a blockchain that self-govern through smart contracts and the voluntary contributions of autonomous ...community members—exhibit the potential to facilitate collective action in managing digital commons. Yet the promise of decentralization and collective action is difficult to sustain. To this end, this paper critically examines the transformational potential of DAOs in the case of decentralized finance. Using a polycentric governance lens, we contribute to the literature on technology-enabled forms of organizing with a model explaining the transformational potential of DAOs to facilitate collective action in digital commons. Our study highlights that (1) DAOs are a new form of organizing enabled by blockchain technology in which individuals are free to pursue their objectives within a general system of rules enforced by smart contracts, (2) collective action for managing digital commons can be sustained through a set of three mechanisms—sustained participation, collective direction, and scaled organizing, and (3) DAOs tend to strike a balance between centralized and fully decentralized or community-based governance by implementing a polycentric governance system involving a combination of human and machine agency that creates skin in the game.
Display omitted
•Textual relevance arguments enhance consumers’ compliance with data requests.•Textual arguments can be facilitated through easily processable game elements.•These game elements need ...to be tailored to the specific purpose of data disclosure.•Meaningful and hedonic engagement are drivers of this positive effect.•This approach is especially worthwhile for retailers facing low trust customers.
Encouraging consumers to enter a data disclosure process constitutes a crucial challenge for retailers. This paper suggests that retailers can lever consumers’ willingness to enter disclosure processes through the design of their data requests. Four experimental studies confirm that consumers are more likely to comply with a data request if retailers do not only use textual relevance arguments but also augment them with relevance-illustrating game elements to further underpin the purpose of data disclosure. This favorable effect can be delineated according to dual-processing models of decision-making: Relevance-illustrating game elements amplify the positive effect of textual relevance arguments by helping consumers to a) cognitively appreciate the objective benefits of data disclosure (i.e., meaningful engagement) and b) increase hedonic engagement on the affective processing route. However, arbitrarily chosen game elements which solely aim at entertaining without conveying the purpose of data disclosure, do not yield these positive effects. Finally, the authors show that the proposed approach is especially worthwhile for retailers facing customers with low trust levels, whereas customers with high trust levels are likely to comply with the data request regardless.
Research findings on how participation in social networking sites (SNSs) affects users’ subjective well-being are equivocal. Some studies suggest a positive impact of SNSs on users’ life satisfaction ...and mood, whereas others report undesirable consequences such as depressive symptoms and anxiety. However, whereas the factors behind the positive effects have received significant scholarly attention, little is known about the mechanisms that underlie the unfavorable consequences. To fill this gap, this study uses social comparison theory and the responses of 1,193 college-age Facebook users to investigate the role of envy in the SNS context as a potential contributor to those undesirable outcomes. Arising in response to social information consumption, envy is shown to be associated with reduced cognitive and affective well-being as well as increased reactive self-enhancement. These preliminary findings contribute to the growing body of information systems research investigating the dysfunctional consequences of information technology adoption in general and social media participation in particular.
The Operations Research EXperiment Framework for Java (OREX-J) is an object-oriented software framework that helps users to design, implement and conduct computational experiments for the analysis of ...optimization algorithms. As it was designed in a generic way using object-oriented programming and design patterns, it is not limited to a specific class of optimization problems and algorithms. The purpose of the framework is to reduce the amount of manual labor required for conducting and evaluating computational experiments: OREX-J provides a generic, extensible data model for storing detailed data on an experimental design and its results. Those data can include algorithm parameters, test instance generator settings, the instances themselves, run-times, algorithm logs, solution properties, etc. All data are automatically saved in a relational database (MySQL,
http://www.mysql.com/
) by means of the object-relational mapping library Hibernate (
http://www.hibernate.org/
). This simplifies the task of analyzing computational results, as even complex analyses can be performed using comparatively simple Structured Query Language (SQL) queries. Also, OREX-J simplifies the comparison of algorithms developed by different researchers: Instead of integrating other researchers’ algorithms into proprietary test beds, researchers could use OREX-J as a common experiment framework. This paper describes the architecture and features of OREX-J and exemplifies its usage in a case study. OREX-J has already been used for experiments in three different areas: Algorithms and reformulations for mixed-integer programming models for dynamic lot-sizing with substitutions, a simulation-based optimization approach for a stochastic multi-location inventory control model, and an optimization model for software supplier selection and product portfolio planning.
Software Ecosystems Burkard, Christoph; Widjaja, Thomas; Buxmann, Peter
Business & information systems engineering,
02/2012, Letnik:
4, Številka:
1
Journal Article
Recenzirano
In the software industry, more and more products are offered as systems that are composed of complementary components. Certain components constitute the core product which is the center of a ...so-called "Software Ecosystem" (SECO). In addition, complementary components are offered by independent vendors (Bosch 2009, p. 1). PUBLICATION ABSTRACT