[AISWorld] contents of the 1st issue of Journal of Strategic Information Systems (JSIS) for 2019

Guy Gable g.gable at qut.edu.au
Sat May 18 20:49:49 EDT 2019


I'm pleased to report contents of the 1st issue of Journal of Strategic Information Systems (JSIS) for 2019. Guy Gable Editor-in-Chief (as of 1 January 2019)

Jones, M. (2019). WHAT WE TALK ABOUT WHEN WE TALK ABOUT (BIG) DATA. JSIS, 28(1), 3-16.
https://www.sciencedirect.com/science/article/pii/S0963868718302622
Chanias, S., Myers, M.D., & Hess T. (2019). DIGITAL TRANSFORMATION STRATEGY MAKING IN PRE-DIGITAL ORGANIZATIONS: THE CASE OF A FINANCIAL SERVICES PROVIDER. JSIS, 28(1), 17-33.
https://www.sciencedirect.com/science/article/pii/S0963868718300143
Belanger, F., & Crossler, R.E. (2019) DEALING WITH DIGITAL TRACES: UNDERSTANDING PROTECTIVE BEHAVIORS ON MOBILE DEVICES. JSIS, 28(1), 34-49.
https://www.sciencedirect.com/science/article/pii/S0963868717303402
Wenyu, D., Pan, S.L., Leidner, D.E., & Ying, W. (2019) AFFORDANCES, EXPERIMENTATION AND ACTUALIZATION OF FINTECH: A BLOCKCHAIN IMPLEMENTATION STUDY. JSIS, 28(1), 50-65.
https://www.sciencedirect.com/science/article/pii/S0963868717302664
Jalali, M.S., Siegel, M., & Madnick, S. (2019) DECISION-MAKING AND BIASES IN CYBERSECURITY CAPABILITY DEVELOPMENT: EVIDENCE FROM A SIMULATION GAME EXPERIMENT. JSIS, 28(1), 66-82.
https://www.sciencedirect.com/science/article/pii/S0963868717304353
Gonzalez, P.A., Ashworth, L., & McKeen, J. (2019) THE CIO STEREOTYPE: CONTENT, BIAS, AND IMPACT. JSIS, 28(1), 83-99.
https://www.sciencedirect.com/science/article/pii/S0963868717303517

In the first article, Mathew Jones challenges us to reconsider the notion of 'big data' arguing the need for a much more nuanced understanding, and pointing the way to important related research.

In the second article, Simon Chanias, Michael Myers and Thomas Hess report insights from an in depth, interpretive case study, concluding that digital transformation strategy (DTS) is a highly dynamic process involving iteration between learning and doing. They theorize an integrated process/activity model that characterizes DTS formulation and implementation in pre-digital organizations.

In the third article, France Belanger and Robert Crossler seek insight into a concern most of us have with the consequences of our 'digital traces', emphasizing mobile device usage in work settings. Their findings provide insights into factors that can be targeted to enhance individuals' protective actions.

The fourth article, is by Wenyu Du, Shan Pan, Dorothy Leidner and Wenchi Ying. Recognising a dearth of guidance on blockchain implementation, the authors conducted a case study of a successful blockchain implementation, wherein they identify affordances of blockchain in the organization and a process model whereby these affordances are actualized. Their study claims theoretical contributions while promising assistance to practitioners with implementing blockchain effectively and extracting value from their investment.

The fifth article, by Mohammad S. Jalali, Michael Siegel, and Stuart Madnick, employs a novel simulation game approach to study the effectiveness of decision-makers in relation to cybersecurity. Their comparison of experienced and inexperienced cohorts highlights the importance of training for decision-makers with a focus on systems thinking skills.

The last article, by Paola Gonzalez, Laurence Ashworth and James McKeen, reports an experimental examination of perceptions of CIO stereotypes and consequences for CIOs gaining and maintaining strategic leadership roles in organizations.





More information about the AISWorld mailing list