-------- Forwarded Message --------
I'm pleased to report contents of the 1st issue of Journal of
Strategic Information Systems (JSIS) for 2019. Guy Gable
Editor-in-Chief (as of 1 January 2019)
Jones, M. (2019). WHAT WE TALK ABOUT WHEN WE TALK ABOUT (BIG)
DATA. JSIS, 28(1), 3-16.
https://www.sciencedirect.com/science/article/pii/S0963868718302622
Chanias, S., Myers, M.D., & Hess T. (2019). DIGITAL
TRANSFORMATION STRATEGY MAKING IN PRE-DIGITAL ORGANIZATIONS: THE
CASE OF A FINANCIAL SERVICES PROVIDER. JSIS, 28(1), 17-33.
https://www.sciencedirect.com/science/article/pii/S0963868718300143
Belanger, F., & Crossler, R.E. (2019) DEALING WITH DIGITAL
TRACES: UNDERSTANDING PROTECTIVE BEHAVIORS ON MOBILE DEVICES.
JSIS, 28(1), 34-49.
https://www.sciencedirect.com/science/article/pii/S0963868717303402
Wenyu, D., Pan, S.L., Leidner, D.E., & Ying, W. (2019)
AFFORDANCES, EXPERIMENTATION AND ACTUALIZATION OF FINTECH: A
BLOCKCHAIN IMPLEMENTATION STUDY. JSIS, 28(1), 50-65.
https://www.sciencedirect.com/science/article/pii/S0963868717302664
Jalali, M.S., Siegel, M., & Madnick, S. (2019) DECISION-MAKING
AND BIASES IN CYBERSECURITY CAPABILITY DEVELOPMENT: EVIDENCE FROM
A SIMULATION GAME EXPERIMENT. JSIS, 28(1), 66-82.
https://www.sciencedirect.com/science/article/pii/S0963868717304353
Gonzalez, P.A., Ashworth, L., & McKeen, J. (2019) THE CIO
STEREOTYPE: CONTENT, BIAS, AND IMPACT. JSIS, 28(1), 83-99.
https://www.sciencedirect.com/science/article/pii/S0963868717303517
In the first article, Mathew Jones challenges us to reconsider the
notion of 'big data' arguing the need for a much more nuanced
understanding, and pointing the way to important related research.
In the second article, Simon Chanias, Michael Myers and Thomas
Hess report insights from an in depth, interpretive case study,
concluding that digital transformation strategy (DTS) is a highly
dynamic process involving iteration between learning and doing.
They theorize an integrated process/activity model that
characterizes DTS formulation and implementation in pre-digital
organizations.
In the third article, France Belanger and Robert Crossler seek
insight into a concern most of us have with the consequences of
our 'digital traces', emphasizing mobile device usage in work
settings. Their findings provide insights into factors that can be
targeted to enhance individuals' protective actions.
The fourth article, is by Wenyu Du, Shan Pan, Dorothy Leidner and
Wenchi Ying. Recognising a dearth of guidance on blockchain
implementation, the authors conducted a case study of a successful
blockchain implementation, wherein they identify affordances of
blockchain in the organization and a process model whereby these
affordances are actualized. Their study claims theoretical
contributions while promising assistance to practitioners with
implementing blockchain effectively and extracting value from
their investment.
The fifth article, by Mohammad S. Jalali, Michael Siegel, and
Stuart Madnick, employs a novel simulation game approach to study
the effectiveness of decision-makers in relation to cybersecurity.
Their comparison of experienced and inexperienced cohorts
highlights the importance of training for decision-makers with a
focus on systems thinking skills.
The last article, by Paola Gonzalez, Laurence Ashworth and James
McKeen, reports an experimental examination of perceptions of CIO
stereotypes and consequences for CIOs gaining and maintaining
strategic leadership roles in organizations.
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org