本文精选了信息系统领域国际顶刊《Journal of the Association for Information Systems》近期发表的论文,提供信息系统领域最新的学术动态。
An Empirical Investigation of Cloud Computing and Environmental Performance of Nations: Implications for Shared Responsibility in Cloud Computing
原刊和作者:
Journal of the Association for Information Systems Volume 26, Issue 5
Jooho Kim (City University of New York)
Jiyong Park (University of Georgia)
Jason Dedrick (Syracuse University)
Abstract
Cloud computing separates service users from carbon emission sources, obscuring IT’s ecological responsibility across national boundaries. This study dissects the digital responsibility of cloud computing, with a focus on obligations and accountability, to address its impact on the environment. To identify direct emitters and beneficiaries of pollution resulting from cloud computing and define the associated obligations, we estimate how cloud computing alters the energy and carbon intensities of IT capital and services in cloud region countries hosting data centers, as well as in neighboring countries. Using country-level data on IT capital stock and IT service expenditures for 51 countries from 1995 to 2016, combined with data on geographical proximity to cloud regions of global public cloud services, our results show that in cloud region countries, the environmental benefits of cloud-based IT services come at the expense of increased energy and carbon intensities from the IT capital providing those services. Conversely, neighboring countries seem to benefit from cloud services that generate pollution in cloud region countries, as evidenced by lower energy and carbon intensities in cloud-based IT services, without compromising their own environmental performance. Our findings suggest that both cloud service hosting and using countries share obligations for the environmental impacts of cloud computing. Building on our empirical findings, we discuss implications for accountability in cloud computing to facilitate the fulfillment of these obligations. We propose a shared responsibility model that allocates accountability between service providers and users, advancing the discourse on cloud computing responsibility and outlining directions for future research.
Link: https://aisel.aisnet.org/jais/vol26/iss5/9
The Effects of IP Address Revelation on Location-Based Name-Calling and User Engagement: Evidence From a Chinese Online Platform
原刊和作者:
Journal of the Association for Information Systems Volume 26, Issue 5
Yuxin Zhang (Wayne State University)
Dafeng Xu (University of Washington)
Abstract
IP address revelation policies are a novel IT intervention designed to regulate user behaviors through de-anonymity and, in China, are implemented to curb misinformation. However, these policies may inadvertently encourage online attacks due to revealed geographic information. There is limited theoretical and empirical understanding of how these interventions influence user behaviors. Drawing on social identity theory, we introduce the scenario of “multiple identities” and analyze how individuals attack others—ostensibly because of the revealed geographic identity but fundamentally due to another salient and substantive identity of actual interest. We analyzed identities and attacks using data from Hupu.com, a Reddit-type platform. We observed an increase in location-based name-calling—where users attack others based on revealed geographic information—following Hupu’s implementation of the IP address revelation policy. Name-calling occurred specifically as political attacks and operated through a proxy model—instead of a choice model—of multiple identities, where the geographic identity was correlated with a more salient political identity, reflecting region-specific political stereotypes. Users leveraged this model to launch attacks for practical reasons, such as avoiding censorship. Relatedly, the policy led to a shift in content and a reduction in users’ geographic representation, as increased hostility discouraged in-depth contributions and deterred participation from users in certain regions. These findings suggest digital interventions revealing one identity (e.g., geographic) may unintentionally affect behaviors associated with another identity (e.g., political), emphasizing the need for careful design of interventions to enhance digital responsibility.
Link: https://aisel.aisnet.org/jais/vol26/iss5/8
Navigating Value Conflicts: How Developers at Varied Levels of Moral Development Approach Decision-Making in Information Systems Development
原刊和作者:
Journal of the Association for Information Systems Volume 26, Issue 5
Khalid Durani (University of Innsbruck)
Andreas Eckhardt (University of Innsbruck)
Tim Kollmer (University of Innsbruck)
Abstract
Information systems development frequently involves value conflicts (e.g., reconciling compliance requirements with user autonomy), thereby requiring developers to engage in moral decision-making regarding what is desirable, right, and just. Drawing on the theory of moral development, this study examines how developers—whose moral reasoning emphasizes self-interest (pre-conventional), maintaining social norms (conventional), or higher-order principles (post-conventional)—navigate these conflicts. We identify varying moral decision-making patterns among developers at the pre-conventional, conventional, and post-conventional levels, structured around four interrelated themes: (1) problem framing, (2) solution conceptualization, (3) responsibility orientation, and (4) duty fulfillment. Our analysis further indicates the pivotal role of developers’ responsibility orientation in guiding moral decision-making. Specifically, this orientation encompasses how developers attribute causal responsibility (e.g., assigning blame) in framing problems, allocate accountability (e.g., taking ownership) in conceptualizing solutions, and balance obligations (e.g., honoring commitments) in fulfilling their duties. Thus, our study shows how distinct responsibility orientations among IS developers at the pre-conventional, conventional, and post-conventional levels critically shape their navigation of value conflicts, ultimately influencing project outcomes.
Link: https://aisel.aisnet.org/jais/vol26/iss5/7
Responsible AI Design: The Authenticity, Control, Transparency Theory
原刊和作者:
Journal of the Association for Information Systems Volume 26, Issue 5
Andrea Rivera (University of Hawaii at Manoa)
Kaveh Abhari (San Diego State University)
Bo Xiao (University of Hawaii at Manoa)
Abstract
Rapid advancements in artificial intelligence (AI) have heightened the need for ethical AI design principles, positioning responsible AI at the forefront across academia, industry, and policy spheres. Despite the plethora of guidelines, responsible AI faces challenges due to fragmentation and the lack of a cohesive explanatory theory guiding research and practice. Existing AI literature frequently fixates on responsible AI attributes within usage contexts, operating under the misapprehension that responsibility can be achieved solely through specific system attributes, responsible algorithms, or minimization of harm. This narrow focus neglects the mechanisms that interlace design decisions with the realization of responsible AI, thereby undervaluing their profound significance. Similarly, information systems literature predominantly emphasizes the operation and usage of these systems, often bypassing the opportunity to weave ethical principles into AI design from its inception. In response, this study adopted a grounded theory approach to theorize responsible AI design from the perspective of AI designers. The authenticity, control, transparency (ACT) theory of responsible AI design emerged as a result. This theory posits that authenticity, control, and transparency are pivotal mechanisms in responsible AI design. These mechanisms ensure that ethical design decisions across three domains—architecture, algorithms, and affordances—translate into responsible AI. The ACT theory offers a parsimonious yet practical foundation for guiding research and practice, aligning ethical AI design with technological advancements and fostering accountability, including algorithmic accountability.
Link: https://aisel.aisnet.org/jais/vol26/iss5/6
What Goals Drive Employees’ Information Systems Security Behaviors? A Mixed Methods Study of Employees’ Goals in the Workplace
Journal of the Association for Information Systems Volume 26, Issue 5
Sebastian Schuetz (University of Colorado Boulder)
Heiko Gewald (Neu-Ulm University of Applied Sciences)
Allen Johnston (University of Alabama)
Jason Bennett Thatcher (University of Colorado Boulder)
Abstract
IT security remains high on the agenda of CIOs, with employees’ adoption of security behaviors—behaviors that employees adopt to protect organizational IT assets—being a top concern. To explain when employees adopt security behaviors, the information systems security (ISec) literature has mainly employed deductive studies that draw on theory-based assumptions about goals—mostly from behavioral theories used in criminology and public health (e.g., avoiding sanctions, avoiding harm from threats, avoiding disapproval and blame). However, as these theories typically do not theorize about employees’ goals specific to the workplace, they offer limited insights into the goals that employees pursue at work. Subsequently, not much is known about the goals that motivate employees’ security behaviors at work. Against this backdrop, this research provides a complementary, inductive-first inquiry into the work-related goals that drive employees’ security behaviors. Using a qualitative-quantitative mixed methods research design, we identify four goals (Study 1) and evaluate their importance for predicting employee security behaviors (Study 2). Overall, we find evidence that employees’ work performance and blame avoidance goals are the most salient predictors of security behaviors; as a result, our findings suggest that employees engage in security behaviors primarily because they believe it will help them meet supervisors’ expectations—a key goal that has been largely ignored in the previous ISec literature.
Link: https://aisel.aisnet.org/jais/vol26/iss5/5