Dark Sides of Digitalization
Permanent URI for this collectionhttps://hdl.handle.net/10125/107552
Browse
Recent Submissions
Item type: Item , The Impact of Organizational Citizenship Behaviors on Technostress in a Post-COVID-19 Remote Work Context: The Role of Media Synchronicity(2024-01-03) Sikhondze, Bachazile; Durcikova, Alexandra; Radhika, SanthanamThe COVID-19 pandemic led to a rapid shift to remote work, resulting in changes in work practices that have caused increased stress and reduced wellbeing among employees. Existing research on technostress primarily focuses on stressors stemming from primary job demands, neglecting the impact of voluntary, extra-role behaviors such as organizational citizen behaviors. To bridge this gap, this study proposes and tests a model that investigates the effects of technology-mediated extra-role behavior on employee productivity and wellbeing in a work-from-home setting. The study identifies three mechanisms through which extra-role behavior adversely influences employee wellbeing: psychological transition, interruption overload, and task closure. Furthermore, the study proposes that the relationship between extra-role behavior and employee wellbeing and productivity is contingent upon the synchronicity of the information communication technology (ICT) platforms.Item type: Item , Sharing Intention of Politicized News on Social Media: Mediators and Moderators(2024-01-03) Bui, Q. Neo; Moriuchi, EmiSocial media is now full of news, much of it politicized news that intends to draw attention and provoke a reaction from users. Prior studies have suggested the importance of social influence on driving sharing intention of news on social media. This study contributes to this discourse by examining the various mediators and moderators for such relationships. Particularly, we examine whether credibility and trust can mediate the relationship between social influence and sharing intention; and whether news type and social identity can moderate such a relationship too. Based on a survey of 802 respondents, we found evidence to support our hypothesized moderation and mediation relationship. What stands out is that among the social influences, credibility and trust only partially mediate the effects of injunctive norms on sharing intention. This suggests that social norms in different cultures and settings can play different roles in the sharing intention of news on social media.Item type: Item , Just Because We Can, Doesn’t Mean We Should: Algorithm Aversion as a Principled Resistance(2024-01-03) Hannon, Oliver; Ciriello, Raffaele; Gal, UriThis paper problematizes the literature on the non-use of algorithmic decision-making systems (ADMS), commonly examined as algorithm aversion. Whilst prior literature attributes algorithm aversion primarily to human bias and irrationality, assuming utility-based evaluations, we argue that it may also stem from values-based evaluations of technology, which are overlooked. Through an integrated ethical analysis, drawing upon the “big three” ethical theories of consequentialism, deontology, and virtue ethics, we examine implicit normative judgments within the algorithm aversion literature. Consequently, we positively reframe algorithm aversion as a potentially principled resistance to ADMS, expanding prior views of the phenomenon. We argue that such resistance may be constructive and lead to a better alignment of ADMS with societal needs and values. Thus, we call on IS scholars to explore this phenomenon as an ethical and sociotechnical issue, rather than as a costly problem to be mitigated, as prior literature might suggest.Item type: Item , Zoombombing: Understanding We-Intention to Engage in Collective Trolling among Online Community Members through the Social Identity Model of Deindividuation Effects(2024-01-03) Gao, Grace Yuekun; Cheung, Christy; Chan, Tommy K.H.; Lee, Zach W.Y.Zoombombing, the disruptive intrusion into video-conference events, has emerged as a destructive consequence resulting from the wide adoption of collaborative technologies. Despite growing attention from various disciplines, Zoombombing remains underexplored in the field of Information Systems (IS). Recognizing Zoombombing as a form of collective trolling, we aim to uncover the group-referent intention (i.e., we-intention) behind online community members’ participation in Zoombombing. Drawing on the social identity model of deindividuation effects (SIDE), we examined how the two aspects of IT-enabled anonymity (i.e., intragroup and intergroup anonymity) exert influence on social elements (i.e., social identities and online disinhibition), ultimately affecting the we-intention to engage collectively in Zoombombing. We validated our research model with a scenario-based survey involving 344 Reddit users. The study contributes to the understanding of Zoombombing as a new form of online collective trolling behavior from the group-referent and sociotechnical perspective and provides insights for research and practice.Item type: Item , Neutralization Tendencies in Information Systems Security Violation(2024-01-03) King, Frank; Paul, SourenIt is estimated that over half of all information systems security breaches are due directly or indirectly to employee’s poor security practices in organizations. This problem is considered the biggest threat to an organization because employees are trusted with the knowledge and privilege of organization’s resources. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. What has not been determine from extant information security research is an explanation that address why employees drift into a neutralization state in the first place. We propose an expansion of the neutralization model by including the effects of business orientation and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy.Item type: Item , Understanding the Process of IT Addiction Recovery: Insights from a Qualitative Study(2024-01-03) Vaghefi, Isaac; Negoita, Bogdan; Lapointe, LietteThe widespread use of information technology has led to undesirable consequences, particularly in the form of IT addiction. Despite recent attention to corrective behaviors that counter IT addiction, a process-based longitudinal overview of IT addiction recovery is still lacking. A process model of IT addiction recovery was developed based on qualitative narrative data obtained from interviews and published blogs and Bandura’s theory of self-regulation as the baseline. It highlights the four stages of observing, assessing, adjusting, and reflecting, through which recovery efforts unfold gradually. In each stage, essential elements underlying successful completion and advancement to the next stage, particularly those that are related to IT artifact, are identified. The findings provide a richer understanding of the IT addiction recovery process and carry important implications for users who struggle with IT addiction, designers, and industry regulators.Item type: Item , Introduction to the Minitrack on Dark Sides of Digitalization(2024-01-03) Qahri-Saremi, Hamed; Turel, Ofir; Vaghefi, Isaac
