[AISWorld] Call for Papers (reminder): Information Systems Research (ISR) Special Issue on Ubiquitous IT and Digital Vulnerabilities

Sam Ransbotham sam.ransbotham at bc.edu
Fri Feb 13 12:07:42 EST 2015


Call for Papers: ISR Special Issue on Ubiquitous IT and Digital 
Vulnerabilities (http://pubsonline.informs.org/page/isre/calls-for-papers)

Special Issue Editors:

     Rob Fichman (fichman at bc.edu <mailto:fichman at bc.edu>)
     Ram Gopal (ram.gopal at business.uconn.edu 
<mailto:ram.gopal at business.uconn.edu>)
     Alok Gupta (alok at umn.edu <mailto:alok at umn.edu>)
     Sam Ransbotham (sam.ransbotham at bc.edu <mailto:sam.ransbotham at bc.edu>)

Submission Deadline: 1 March 2015

“The myriad connections forged by […] technologies have brought 
tremendous benefits to everyone who uses the web to tap into humanity’s 
collective store of knowledge every day. But there is a darker side to 
this extraordinary invention.” (Economist 2014)

IDEA IN BRIEF

It is incontrovertible that IT permeates every aspect of organizational, 
social, and economic activity. The ubiquity of information technology 
has profoundly changed society—usually for the better but sometimes for 
the worse. This special issue seeks to counterbalance the focus on the 
positive aspects and outcomes of pervasive digitization by stimulating 
research on vulnerabilities introduced or exacerbated by new (and old) 
forms of IT. Our goal is to develop and promote novel ideas for 
preserving or strengthening the potential benefits of pervasive IT while 
mitigating potential drawbacks. Hence, the focus will be not just on 
identifying vulnerabilities, but, rather, on the development of new 
managerial wisdom for better managing organizations, societies, and our 
personal lives in light of these vulnerabilities.

DETAILS

Modern society is rapidly developing and diffusing previously 
unimaginable information technologies. Systems that collect information 
now permeate all areas of society and range from widely used Internet 
applications to personal technologies to distributed embedded devices. 
These systems now routinely retain structured and unstructured data in 
hitherto unprecedented quantities. Google, for example, estimates that 
its data store performs four trillion read/write transactions per month. 
Detailed data collection is now pervasive, both by individuals (e.g., 
the quantified self movement, Economist 2012) and by others (e.g., 
online activity, Geary 2012), and leads to unresolved questions about 
the nature of digital vulnerabilities. As tools and techniques swiftly 
evolve to process this information and use it in new ways, the 
opportunities and challenges associated with information are 
fundamentally changing. Privacy and security are clearly important, but 
much remains to be understood about many issues such as ethics, 
responsible use, algorithmic accountability, discrimination, 
de-anonymization, and policy implications.

A wealth of prior research sheds light on many ways that organizations 
can use systems to gather, organize, select, synthesize, and distribute 
information across all areas of the value chain including operations, 
logistics, production, marketing, design, service, and infrastructure. 
Emerging applications of IT provide significant opportunities for 
advantage. However, emerging technologies also frequently have the 
potential for unintended consequences or may create one problem even as 
they solve another (Overby et al. 2010). For example, the Centers for 
Medicare and Medicaid Services (CMS) recently made public for the first 
time how much Medicare pays individual doctors and other providers, and 
this marked a major milestone in healthcare transparency (Blum 2014); 
however, it has also sparked concerns that individual physicians may be 
incorrectly targeted and publicly shamed (e.g., Salzberg 2014, Weaver et 
al. 2014). Furthermore, while pioneering uses of information continue to 
emerge, many aspects of IT have become commodities that do not confer 
advantage but are instead required and necessary for minimal 
organizational operation. Unfortunately, these pervasive uses of and 
dependencies on IT may also introduce vulnerabilities for individuals 
and organizations. To illustrate, the scale of a national system to 
facilitate health insurance markets necessitates IT infrastructure. Yet 
difficulties with the launch of the United States healthcare.gov site 
caused significant loss of time, political and reputational damage, and 
direct expense (BBC News 2013). Additionally, emerging or commodity uses 
of IT may differentially affect societal subgroups along social or 
economic strata with concomitant policy implications (Mitra and 
Ransbotham 2012). Overall, vulnerabilities have received considerably 
less attention from researchers than benefits but are critical to the 
continued successful use of IT.

How can we maximize benefits and create value from advances in IT while 
minimizing drawbacks? This special issue takes a broad view of 
vulnerability and calls for novel, data-focused approaches to identify 
sources of vulnerability, to understand their underlying mechanisms, and 
to mitigate their effects. Submissions at any level of analysis are 
welcome but should be grounded in data (including field and lab 
experiments, archival data, primary data collection). Topics of interest 
include but are not limited to vulnerabilities (and associated tensions) 
related to the following:

- Liability, electronic discovery, and legal implications of new forms 
of data tracking and retention
- Widespread public exposure of confidential or unflattering 
organizational or individual information (e.g., through social media or 
search)
- Intellectual property issues (copying, reverse engineering, theft, 
espionage) in a globally connected society
- Catastrophic operational disruptions arising from system failures
- Dissemination of information with dangerous applications (e.g., 
related to terrorism, crime, risky personal behavior)
- Tensions in transparency of information (e.g., health, financial, or 
operational)
- Privacy and personal data disclosure
- Ethical uses of information
- Management and implications of emerging payment systems and currencies
- Pervasive use of surveillance that may both secure and subjugate
- Cyber stalking, bullying, and harassment
- Information technology used for fraud and deception
- Future directions in vulnerability research
- Domain-specific issues (e.g., marketing, law, health, education)

PROJECTED TIMELINE

     January 4, 2015    Early reactions to paper ideas (optional)
     March 1, 2015    Submissions due
     June 2015    First round of editorial decisions
     September 2015    Special issue workshop at Boston College
     January 10, 2016    Revisions due
     March 2016    Second round of editorial decisions
     May 8, 2016    Final revisions due
     June 2016    Final editorial decisions
     Sept/Dec 2016    Publication

EDITORIAL REVIEW BOARD

     Ahmed Abbasi (Virginia)
     Alessandro Acquisti (CMU)
     Terrence August (UCSD)
     France Belanger (Virginia Tech)
     Huseyin Cavusoglu (UT Dallas)
     Ram Chellappa (Emory)
     Elizabeth Davidson (Hawaii)
     Debabrata Dey (Washington)
     Kai Lung Hui (HKUST)
     Eric Johnson (Vanderbilt)
     Karthik Kannan (Purdue)
     Paul Lowry (Hong Kong)
     James Marsden (Connecticut)
     Sabyasachi Mitra (Georgia Tech)
     Vijay Mookerjee (UT Dallas)
     Tyler Moore (SMU)
     Eric Overby (Georgia Tech)
     Rema Padman (CMU)
     Srinivasan Raghunathan (UT Dallas)
     Sasha Romanosky (RAND)
     Matti Rossi (Aalto)
     Larry Sanders (SUNY - Buffalo)
     Raghu Santanam (Arizona State)
     Ulrike Schultze (SMU)
     Olivia Sheng (Utah)
     Param Singh (CMU)
     Mikko Siponen (Jyväskylä)
     Carsten Sørensen (LSE)
     Catherine Tucker (MIT)
     Merrill Warkentin (Mississippi State)

BIBLIOGRAPHY

     BBC News (2013) Obama addresses healthcare website glitches. 
October 21, http://www.bbc.com/news/world-us-canada-24613022.
     Blum J, (2014) Next steps in Medicare data transparency. Centers 
for Medicare & Medicaid Services, 
http://blog.cms.gov/2014/04/02/next-steps-in-medicare-data-transparency/.
     The Economist (2012) Counting every moment. The Economist, March 3, 
http://www.economist.com/node/21548493.
     The Economist (2014) Defending the digital frontier. The Economist, 
July 12, 
http://www.economist.com/blogs/babbage/2014/07/special-report-cyber-security. 

     Geary J (2012) Tracking the trackers: What are cookies? An 
introduction to web tracking. The Guardian, April 23.
     Mitra S, Ransbotham S (2012) The effects of vulnerability 
disclosure policy on the diffusion of security attacks. Proc. Internat. 
Conf. on Inform. Systems.
     Overby E, Slaughter S, Konsynski B (2010) The design, use, and 
consequences of virtual processes. Inform. Systems Res. 21(4):700-710.
     Salzberg S (2014) New Medicare data reveal startling $496 million 
wasted On chiropractors. Forbes, April 20.
     Weaver C, Beck M, Winslow R (2014) Doctor-pay trove shows limits of 
Medicare billing data. Wall Street Journal, April 9.

-- 
Sam Ransbotham
     Boston College
        Associate Professor of Information Systems
        sam.ransbotham at bc.edu

     MIT-Sloan Management Review
        Guest Editor, Data and Analytics
        ransboth at mit.edu

Twitter: @Ransbotham
http://www.SamRansbotham.com
MIT-SMR articles: http://sloanreview.mit.edu/?s=ransbotham
phone: 617-552-0465

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150213/b072fa88/attachment.html>


More information about the AISWorld mailing list