Skip repeated menu and go directly to contents

San Diego State University

Fowler College of
Business Administration

Intellectual Contribution

Journal of Management Information Systems Special Issue: Social Aspects of Socio-technical Systems
Briggs, R. O., Nunamaker, J. F., Sprague, R. H.
Type of Research
Date Published
2010, After July
Contribution Type
Publication Title
Journal of Management Information Systems
ME Sharpe
Armonk, New York; London, England
Volume 26 Number 7 Summer 2010
The purpose of information systems (IS) is to provide information to people who must make choices about the disposition of scarce resources. One goal of IS research is, therefore, to improve those choices by finding ways to increase the timeliness, accuracy, and completeness of information at a minimum of costs---economic, cognitive, political, social, affective, and physical. At the heart of IS research, then, is a complex optimization problem. Information can be made timelier, for example, by making it less accurate and less complete. Less accurate, less complete information, however, may yield a lower likelihood of useful choices and a higher likelihood of unintended consequences, with a potential for negative economic, political, and social outcomes. Complete information, on the other hand, may impose untenably high cognitive load, which may engender negative affect, which in turn may have political, social, and economic implications. IS optimized along several dimensions---say, economic, cognitive, and social---may nonetheless invoke negative value along another dimension---for example, political---and so fail at great expense. IS research, therefore, finds itself at the crossroads of many social and technical disciplines, drawing insights from each and returning scientific contributions to each. The unique contribution of IS research, however, is an understanding of these many concepts as systems to inform choice. IS/IT (information technology) artifacts are central to the IS we create and study. IS are, however, more than their hardware, software, and data. IS also encompass the people and the work practices needed to produce the information the system yields. They are, therefore, characterized not as technical, but as sociotechnical. Another goal of IS research is to find ways to develop and deploy systems so as to maximize utility and acceptability for users while minimizing cost, development time, and system defects. Systems developers must design and create IS/IT artifacts and work practices and transfer them to users and decision makers. Those they serve, IS professionals, also use structured work practices supported by IS/IT artifacts, and so the IS/IT artifact is also central to systems development research. As with IS, however, IS development is a sociotechnical endeavor. It is important, therefore, that the IS research community focus not only on the technical issues but also on the human issues of IS. Toward that end, in this Special Section of JMIS, we focus on the social aspects of sociotechnical systems. The issue presents eight papers drawn from the best-paper nominees of the 2009 Hawaii International Conference on System Sciences. Each paper addresses a topic pertaining to the people and work practices involved in designing, developing, and deriving value from IS. In the first paper of the Special Section, "‘Follow the Sun’ Workflow in Global Software Development," Erran Carmel, J. Alberto Espinosa, and Yael Dubinsky draw on the literature and field experience to derive the logic for predicting and explaining the efficiency of work practices for follow-the-sun software development. In follow-the-sun projects, subteams in different geographical locations hand off development tasks at the end of each day to another subteam in an earlier time zone. The authors present arguments for 12 propositions pertaining to the duration and efficiency of follow the sun and derive simple formulas for calculating several aspects of efficiency and for predicting the effects of changes in efficiencies on the duration of projects. The arguments advanced in the paper provide a foundation for much future academic inquiry and provide useful guidelines for IS professionals about when to choose a follow-the-sun approach and how to conduct it so as to derive its potential benefits. In their paper, "Perpetual Versus Subscription Licensing Under Quality Uncertainty and Network Externality Effects," Jie (Jennifer) Zhang and Abraham Seidmann address optimizing the value realized by software developers from the software they create. The authors examine issues pertaining to network effects, quality uncertainty, upgrade compatibility, and vendor ability to commit to future prices in a dynamic environment and demonstrate how a software vendor can manage the trade-offs of perpetual licensing and subscription to optimize profit and the welfare of consumers. The insights in the paper will be useful not only for making specific decisions but also for those forming a longer-term strategy of licensing vendor software. In "The Power of Patterns and Pattern Recognition When Developing Information-Based Strategy," Eric K. Clemons discusses six patterns pertaining to competitive advantage, profitability, and the changing nature of the organization. These patterns are derived from a 20‑year research stream on strategic use of IS. The research began with a focus on the effects of information on business practices and drew on interviews with leaders in many industries. At the nexus of three domains---information, strategy, and economics---this work has implications for all three fields and should be useful to future researchers and organizational leaders who seek to deploy information and technology to strategic advantage. Steven Poltrock and Mark Handel compare and contrast eight different approaches to modeling collaborative work practices and discuss their value for designers and users of collaboration technologies in their paper, "Models of Collaboration as the Foundation for Collaboration Technologies." The authors organize the modeling conventions into two categories: (1) ostensive models that define how a collaborative work practice should be executed and (2) performative models that capture the ways that collaborative work is actually conducted. They argue that ostensive models are useful for documenting, planning, analyzing, simulating, and automating collaborative work practices, whereas performative models are useful for discovering deviations from normative practices, for discovering new ways that people use existing systems, and for discovering and nurturing important relationships. The paper posits that no single modeling convention provides a complete understanding of a system and that each is useful to creating a whole understanding. In their paper, "Bounded Ideation Theory," Robert O. Briggs and Bruce A. Reinig advance a theory to explain the relationship between the number of ideas a group produces and the number of good ideas that emerge from an ideation session. Bounded ideation theory (BIT) posits that boundaries of understanding, attention resources, goal congruence, mental and physical stamina, and the solution space moderate a primary relationship between individual ability and idea quality, yielding an ideation function with an inflected curve. Drawing on the logic of the theory, the paper proposes six strategies for improving ideation. It challenges Alex F. Osborn’s often-cited conjecture that the more ideas a group produces, the more good ideas will result. The authors suggest that two widely used measurement approaches for comparing the merits of ideation techniques are flawed and advocate the use of a third approach. They question the value of the quantity focus of ideation research in the IS/IT literature and argue that a quality focus would be more useful. The paper provides researchers with new ways to approach ideation research and may provide practitioners with ways to gain more value from their ideation sessions. In "Network Externalities and Technology Use: A Quantitative Analysis of Intraorganizational Blogs," Sunil Wattal, Pradeep Racherla, and Munir Mandviwalla explore the degree to which an individual’s system usage can be predicted by a network effect---system usage by others in one’s social network, and by the degree to which others provide positive or negative feedback about the system. The researchers also study the degree to which these effects may be moderated by age and gender. They find that network effects are more pronounced among men than women, and they report a nonlinear effect for age. They find that positive responses to a user’s blog postings correlate with higher blog usage and that people whose managers blog are more likely to blog themselves. Their paper describes phenomena that bear further theoretical and experimental research and may be useful to managers who wish to implement blogs in service of organizational goals. The paper "Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment," by Matthew L. Jensen, Paul Benjamin Lowry, Judee K. Burgoon, and Jay F. Nunamaker Jr., examines the use of decision aids for developing solutions to complex problems, focusing in particular on the challenge of assessing the credibility of others with whom one interacts. Drawing on the theory of technological dominance, the paper presents findings of an experiment that provided both novices and experts with a decision aid for detecting deception in a high-stakes scenario. Both professionals and novices improved their assessment accuracy using the decision aid, although they tended to discount the aid’s recommendations when the aid contradicted their assessments. This research should be useful in a wide range of high-stakes scenarios where the credibility of one’s interaction partners is crucial. The paper suggests new research directions both for credibility assessment and for improving the theory of technological dominance. Finally, in their paper, "Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective on the Theory of Moral Disengagement," Omar Alnuaimi, Lionel P. Robert Jr., and Likoebe M. Maruping report on a study of factors that influence social loafing in a team setting. Building on the foundation of moral disengagement theory, the authors posit three cognitive mechanisms to explain observed correlations of team size and dispersion with social loafing---diffusion of responsibility, attribution of blame, and dehumanization. In a study of 32 student teams, they found that diffusion of responsibility, attribution of blame, and dehumanization partially mediate the effects of team size on social loafing, while only dehumanization fully mediates the effects of dispersion on social loafing. Each of the papers in this issue examines a different social aspect of IS. These papers bring together a diversity of theoretical perspectives and a variety of methodological approaches. We commend them to your reading.
# of Articles