Refine
Document Type
- Article (27)
- Conference Proceeding (6)
- Postprint (5)
- Report (3)
- Doctoral Thesis (1)
- Other (1)
Keywords
- social media (7)
- AMNET (2)
- COVID-19 (2)
- Governance (2)
- Open Source (2)
- ad hoc learning (2)
- ad hoc messaging network (2)
- artificial intelligence (2)
- conversational agents (2)
- crisis communication (2)
Institute
In recent years, the development of software in open source communities has attracted immense attention from research and practice. The idea of commercial quality, free software, and open source code accelerated the development of well-designed open source software such as Linux, Apache tools, or Perl. Intrinsic motivation, group identification processes, learning, and career concerns are the key drivers for a successful cooperation among the participants. These factors and most mechanisms of control, coordination, and monitoring forms of open source communities can hardly be explained by traditional organizational theories. In particular, the micro and macro structures of open source communities and their mode of operation are hardly compatible with the central assumption of the New Institutional Theory, like opportunistic behavior. The aim of this contribution is to identify factors that sustain the motivation of the community members over the entire life cycle of an open source project. Adequate coordination and controlling mechanisms for the governance in open source communities may be extracted.
The concept of the virtual corporation (VC), which describes a modern form of collaboration among organizations, was introduced in the scientific discussion in the mid 1990th. The practice shows that VCs need new forms of governance because the traditional mechanisms of control, management, and steering are hardly applicable. Until now there is only a few research related to the question how to govern VC. The main problems to govern a VC are to coordinate the communication among dispersed partners and to motivate employees to actively involve themselves into the network. Open source projects are confronted with similar problems. As several governance mechanisms are already analyzed in this context, the authors analyze and adopt governance concepts from open source projects to extract a governance framework for virtual corporations. This new approach leads to innovative insights in governing virtual corporations by using community techniques as an appropriate way for communication and collaboration purposes.
The requirements of modern e-learning techniques change. Aspects such as community interaction, flexibility, pervasive learning and increasing mobility in communication habits become more important. To meet thesechallenges e-learning platforms must provide support on mobile learning. Most approaches try to adopt centralized and static elearning mechanisms to mobile devices. However, often technically it is not possible for all kinds of devices to be connected to a central server. Therefore we introduce an application of a mobile e-learning network which operates totally decentralized with the help of an underlying ad hoc network architecture. Furthermore the concept of ad hoc messaging network (AMNET) is used as basis system architecture for our approach to implement a platform for pervasive mobile elearning.
During the outbreak of the COVID-19 pandemic, many people shared their symptoms across Online Social Networks (OSNs) like Twitter, hoping for others’ advice or moral support. Prior studies have shown that those who disclose health-related information across OSNs often tend to regret it and delete their publications afterwards. Hence, deleted posts containing sensitive data can be seen as manifestations of online regrets. In this work, we present an analysis of deleted content on Twitter during the outbreak of the COVID-19 pandemic. For this, we collected more than 3.67 million tweets describing COVID-19 symptoms (e.g., fever, cough, and fatigue) posted between January and April 2020. We observed that around 24% of the tweets containing personal pronouns were deleted either by their authors or by the platform after one year.
As a practical application of the resulting dataset, we explored its suitability for the automatic classification of regrettable content on Twitter.
Fighting false information
(2023)
The digital transformation poses challenges for public sector organizations (PSOs) such as the dissemination of false information in social media which can cause uncertainty among citizens and decrease trust in the public sector. Some PSOs already successfully deploy conversational agents (CAs) to communicate with citizens and support digital service delivery. In this paper, we used design science research (DSR) to examine how CAs could be designed to assist PSOs in fighting false information online. We conducted a workshop with the municipality of Kristiansand, Norway to define objectives that a CA would have to meet for addressing the identified false information challenges. A prototypical CA was developed and evaluated in two iterations with the municipality and students from Norway. This research-in-progress paper presents findings and next steps of the DSR process. This research contributes to advancing the digital transformation of the public sector in combating false information problems.
Despite the merits of public and social media in private and professional spaces, citizens and professionals are increasingly exposed to cyberabuse, such as cyberbullying and hate speech. Thus, Law Enforcement Agencies (LEA) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberabuse. However, their tasks are getting more complex by the increasing amount and varying quality of information disseminated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYLENCE project, which seeks to design strategies and tools for cross-media reporting, detection, and treatment of cyberbullying and hatespeech in investigative and law enforcement agencies. Second, it identifies and elaborates seven research challenges with regard to the monitoring, analysis and communication of cyberabuse in LEAs, which serve as a starting point for in-depth research within the project.
Working conditions of knowledge workers have been subject to rapid change recently. Digital nomadism is no longer a phenomenon that relates only to entrepreneurs, freelancers, and gig workers. Corporate employees, too, have begun to uncouple their work from stationary (home) offices and 9-to-5 schedules. However, pursuing a permanent job in a corporate environment is still subject to fundamentally different values than postulated by the original notion of digital nomadism. Therefore, this paper explores the work identity of what is referred to as ‘corporate nomads’. By drawing on identity theory and the results of semi-structured interviews, the paper proposes a conceptualization of the corporate nomad archetype and presents nine salient identity issues of corporate nomads (e.g., holding multiple contradictory identities, the flexibility paradox, or collaboration constraints). By introducing the ‘corporate nomad’ archetype to the Information Systems literature, this article helps to rethink established conceptions of “home office” and socio-spatial configurations of knowledge work.
Digital transformation fundamentally changes the way individuals conduct work in organisations. In accordance with this statement, prevalent literature understands digital workplace transformation as a second-order effect of implementing new information technology to increase organisational effectiveness or reach other strategic goals. This paper, in contrast, provides empirical evidence from two remote-first organisations that undergo a proactive rather than reactive digital workplace transformation. The analysis of these cases suggests that new ways of working can be the consequence of an identity change that is a precondition for introducing new information technology rather than its outcome. The resulting process model contributes a competing argument to the existing debate in digital transformation literature. Instead of issuing digital workplace transformation as a deliverable of technological progress and strategic goals, this paper supports a notion of digital workplace transformation that serves a desired identity based on work preferences.
Despite energy efficiency measures, global energy demand has gradually increased due to global economic growth and changes in consumer behavior. Even if people are aware of the problem and want to change their energy consumption, they have difficulty acting on their attitudes. This is called the attitude-behavior gap. To narrow this gap and reduce energy consumption and CO2 emissions, behavioral interventions beyond technological advances must be considered. A promising intervention is nudging, which uses insights from behavioral economics to gently nudge individuals toward more sustainable choices. In this study, we investigate how modifying digital choice architectures with nudges can be used to influence consumer energy conservation behavior in smart home applications (SHAs). We conducted an online experiment with 391 participants to test the effectiveness of the following three digital nudges in an SHA: self-commitment, reminder, and social norm nudge. While the results of a structural equation model indicated no effect on bridging the gap between attitude and behavior, we found the potential to promote energy conservation with two nudge types. Thus, this paper makes substantial contribution to persuasive and information systems-enabled sustainability for a better world in the form of digital nudges for emerging technologies.
We would like to inform the readers and editors of the journal that we have discovered some errors in the references of our paper. These errors were brought to our attention by a reader who noticed some inconsistencies between the citations in the text and the bibliography. Upon further investigation, we realized that our literature management software had mistakenly linked some of the references to wrong or non-existent sources. We apologize for this oversight and assure you that it did not affect the validity or quality of our arguments and results, which were based on the correct sources. Below you find a list of the incorrect references along with their corresponding correct ones. We hope that this correction statement will clarify any confusion or misunderstanding that may have arisen from this mistake. The authors would like to apologise for any inconvenience caused.