@article{65311,
  abstract     = {{Information Systems (IS) is rooted in systems theory. Systems theory offers powerful concepts to address challenges of growing system complexity and non-systemic design approaches in information systems. Despite its systemic origins, systems theory remains a peripheral topic in IS. The study addresses this gap by introducing a comprehensive framework of 52 systems-theoretical concepts to guide the design of complex IS artifacts. We synthesize scattered systems knowledge from diverse disciplines to provide a unified level of abstraction for complex information system design. We apply the framework to a use case of business reputation systems to show how the systems lens informs the design of a novel, complex information system. We make three key contributions to the literature. First, the framework provides a common ground for interdisciplinary research in information system design. Second, it offers a unified level of abstraction grounded in systems theory that serves as a coherent basis for artifact design. Third, it demonstrates the potential of systems theory as a foundational justificatory knowledge base. Furthermore, we provide guidance on applying the framework across multiple modes of reasoning, alongside further application guidelines. The study thus serves as a bridge between the body of systems knowledge and contextual design in IS.}},
  author       = {{Ibrahimli, Ulvi and Hemmrich, Simon and Winkelmann, Axel}},
  journal      = {{Communication of the Association for Information Systems}},
  keywords     = {{Information Systems Research, Systems Theory, System Complexity, System Design, Design Science}},
  publisher    = {{AIS}},
  title        = {{{Bridging Systems Theory and Information Systems: A Framework for Designing Complex Information Systems}}},
  doi          = {{https://aisel.aisnet.org/cais/vol58/iss1/37/}},
  year         = {{2026}},
}

@article{53213,
  author       = {{Amiri, Arman and Tavana, Madjid and Arman, Hosein}},
  issn         = {{2542-6605}},
  journal      = {{Internet of Things}},
  keywords     = {{Management of Technology and Innovation, Artificial Intelligence, Computer Science Applications, Hardware and Architecture, Engineering (miscellaneous), Information Systems, Computer Science (miscellaneous), Software}},
  publisher    = {{Elsevier BV}},
  title        = {{{An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction}}},
  doi          = {{10.1016/j.iot.2023.101027}},
  volume       = {{25}},
  year         = {{2024}},
}

@article{47800,
  abstract     = {{<jats:p>The introduction of Systems Engineering is an approach for dealing with the increasing complexity of products and their associated product development. Several introduction strategies are available in the literature; nevertheless, the introduction of Systems Engineering into practice still poses a great challenge to companies. Many companies have already gained experience in the introduction of Systems Engineering. Therefore, as part of the SE4OWL research project, the need to conduct a study including expert interviews and to collect the experiences of experts was identified. A total of 78 hypotheses were identified from 13 expert interviews concerning the lessons learned. Using exclusion criteria, 52 hypotheses were validated in a subsequent quantitative survey with 112 participants. Of these 52 hypotheses, 40 could be confirmed based on the survey results. Only four hypotheses were rejected, and eight could neither be confirmed nor rejected. Through this research, guidance is provided to companies to leverage best practices for the introduction of their own Systems Engineering and to avoid the poor practices of other companies.</jats:p>}},
  author       = {{Wilke, Daria and Grothe, Robin and Bretz, Lukas and Anacker, Harald and Dumitrescu, Roman}},
  issn         = {{2079-8954}},
  journal      = {{Systems}},
  keywords     = {{Information Systems and Management, Computer Networks and Communications, Modeling and Simulation, Control and Systems Engineering, Software}},
  number       = {{3}},
  publisher    = {{MDPI AG}},
  title        = {{{Lessons Learned from the Introduction of Systems Engineering}}},
  doi          = {{10.3390/systems11030119}},
  volume       = {{11}},
  year         = {{2023}},
}

@article{49157,
  abstract     = {{<jats:p> Service frontline encounters between customers and service providers have been subject to fundamental changes in recent years. As two major change agents, technology infusion and data privacy regulations are inextricably linked and constitute a critical ethical and societal issue. Specifically, service frontlines—as represented by human or technological agents, or some hybrid form—rely on customer data for service provision, which subjects them to privacy regulations governing the collection, submission, access, and use of any customer data thus captured. However, scant research outlines the significant implications of evolving data privacy regulations for service frontline encounters. To advance knowledge in this domain, this research distills six key dimensions of global data privacy regulations (fairness, data limits, transparency, control, consent, and recourse). Employing an intelligences theoretical lens, the authors theorize how these dimensions might become differentially manifest across three service frontline interface types (human-based, technology-based, and hybrid). Carefully intersecting the need for varying intelligences across data privacy regulatory dimensions with the abilities of service frontline interfaces to harness each intelligence type, this study offers a novel conceptual framework that advances research and practice. Theoretical, managerial, and policy implications unfold from the proposed framework, which also can inform a future research agenda. </jats:p>}},
  author       = {{Steinhoff, Lena and Martin, Kelly D.}},
  issn         = {{1094-6705}},
  journal      = {{Journal of Service Research}},
  keywords     = {{Organizational Behavior and Human Resource Management, Sociology and Political Science, Information Systems}},
  number       = {{3}},
  pages        = {{330--350}},
  publisher    = {{SAGE Publications}},
  title        = {{{Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces}}},
  doi          = {{10.1177/10946705221141925}},
  volume       = {{26}},
  year         = {{2023}},
}

@article{51770,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Workarounds are goal‐driven deviations from the standard operating procedures performed to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes, they can become established across an organisation and trigger the innovation of processes and IT artefacts that can resolve misfits permanently. Although prior research has elicited antecedents and types of workarounds, it is not known how workarounds diffuse in an organisation and, thereby, innovating co‐workers' activities, IT artefacts, and organisational structures. The results of our multiple two‐year case study provide unique empirical insights into the diffusion of workarounds and how they can act as generative mechanisms for bottom‐up process innovation.</jats:p>}},
  author       = {{Bartelheimer, Christian and Wolf, Verena and Beverungen, Daniel}},
  issn         = {{1350-1917}},
  journal      = {{Information Systems Journal}},
  keywords     = {{Computer Networks and Communications, Information Systems, Software}},
  number       = {{5}},
  pages        = {{1085--1150}},
  publisher    = {{Wiley}},
  title        = {{{Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study}}},
  doi          = {{10.1111/isj.12435}},
  volume       = {{33}},
  year         = {{2023}},
}

@article{53220,
  author       = {{Tavana, Madjid and Khalili Nasr, Arash and Ahmadabadi, Alireza Barati and Amiri, Alireza Shamekhi and Mina, Hassan}},
  issn         = {{2542-6605}},
  journal      = {{Internet of Things}},
  keywords     = {{Management of Technology and Innovation, Artificial Intelligence, Computer Science Applications, Hardware and Architecture, Engineering (miscellaneous), Information Systems, Computer Science (miscellaneous), Software}},
  publisher    = {{Elsevier BV}},
  title        = {{{An interval multi-criteria decision-making model for evaluating blockchain-IoT technology in supply chain networks}}},
  doi          = {{10.1016/j.iot.2023.100786}},
  volume       = {{22}},
  year         = {{2023}},
}

@article{53230,
  author       = {{Mahdiraji, Hannan Amoozad and Tavana, Madjid and Rezayar, Ali}},
  issn         = {{0196-9722}},
  journal      = {{Cybernetics and Systems}},
  keywords     = {{Artificial Intelligence, Information Systems, Software}},
  number       = {{1}},
  pages        = {{104--137}},
  publisher    = {{Informa UK Limited}},
  title        = {{{A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability}}},
  doi          = {{10.1080/01969722.2022.2055402}},
  volume       = {{54}},
  year         = {{2023}},
}

@inproceedings{37497,
  abstract     = {{Since historical times, cartographic maps have revealed spatial relations and enabled decisions and processes. Geographic Information Systems (GIS) allow for acquisition, management, analysis, and presentation of geospatial objects. With free geospatial data becoming available through open data policies and an increasing amount of digitally connected objects in the Internet of Things (IoT), GIS are becoming indispensable to Information Systems (IS) research. However, the consideration and relevance of GIS has only been investigated rarely. We examine, how and in which fields of application GIS have been studied in the IS literature and elicit the importance of GIS regarding their design and usage. A systematic literature review leads us to develop four research propositions. Our results indicate that GIS are still an undeservedly underrepresented discipline in IS and should be more theorized, put center-stage in design-oriented research, and considered for creating superior value co-creation in service systems.}},
  author       = {{Priefer, Jennifer}},
  booktitle    = {{Proceedings of the 56th Hawaii International Conference on System Sciences}},
  editor       = {{Bui, T.X. and Sprague, R.H.}},
  keywords     = {{GIS, Industry 4.0, and Sustainability, geographic information systems, geospatial data, gis, information systems research, literature review}},
  title        = {{{Geographic Information Systems in Information Systems Research - Review and Research Prospects}}},
  year         = {{2023}},
}

@article{41874,
  author       = {{Pfeiffer, Jella and Gutschow, Julia and Haas, Christian and Möslein, Florian and Maspfuhl, Oliver and Borgers, Frederik and Alpsancar, Suzana}},
  issn         = {{2363-7005}},
  journal      = {{Business &amp; Information Systems Engineering}},
  keywords     = {{Information Systems}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Algorithmic Fairness in AI}}},
  doi          = {{10.1007/s12599-023-00787-x}},
  year         = {{2023}},
}

@article{44382,
  abstract     = {{<jats:p>The success of engineering complex technical systems is determined by meeting customer requirements and institutional regulations. One example relevant to the automobile industry is the United Nations Economic Commission of Europe (UN ECE), which specifies the homologation of automobile series and requires proof of traceability. The required traceability can be achieved by modeling system artifacts and their relations in a consistent, seamless model—an effect-chain model. Currently, no in-depth methodology exists to support engineers in developing certification-compliant effect-chain models. For this purpose, a new methodology for certification-compliant effect-chain modeling was developed, which includes extensions of an existing method, suitable models, and tools to support engineers in the modeling process. For evaluation purposes, applicability is proven based on the experience of more than 300 workshops at an automotive OEM and an automotive supplier. The following case example is chosen to demonstrate applicability: the development of a window lifter that has to meet the demands of UN ECE Regulations R156 and R21. Results indicate multiple benefits in supporting engineers with the certification-compliant modeling of effect chains. Three benefits are goal-oriented modeling to reduce the necessary modeling capacity, increasing model quality by applying information quality criteria, and the potential to reduce costs through automatable effect-chain analyses for technical changes. Further, companies in the automotive and other industries will benefit from increased modeling capabilities that can be used for architecture modeling and to comply with other regulations such as ASPICE or ISO 26262.</jats:p>}},
  author       = {{Gräßler, Iris and Wiechel, Dominik and Koch, Anna-Sophie and Sturm, Tim and Markfelder, Thomas}},
  issn         = {{2079-8954}},
  journal      = {{Systems}},
  keywords     = {{Information Systems and Management, Computer Networks and Communications, Modeling and Simulation, Control and Systems Engineering, Software}},
  number       = {{3}},
  publisher    = {{MDPI AG}},
  title        = {{{Methodology for Certification-Compliant Effect-Chain Modeling}}},
  doi          = {{10.3390/systems11030154}},
  volume       = {{11}},
  year         = {{2023}},
}

@article{45484,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Graffiti is an urban phenomenon that is increasingly attracting the interest of the sciences. To the best of our knowledge, no suitable data corpora are available for systematic research until now. The Information System Graffiti in Germany project (<jats:sc>Ingrid</jats:sc>) closes this gap by dealing with graffiti image collections that have been made available to the project for public use. Within <jats:sc>Ingrid</jats:sc>, the graffiti images are collected, digitized and annotated. With this work, we aim to support the rapid access to a comprehensive data source on <jats:sc>Ingrid</jats:sc> targeted especially by researchers. In particular, we present <jats:sc>Ingrid</jats:sc>KG, an RDF knowledge graph of annotated graffiti, abides by the Linked Data and FAIR principles. We weekly update <jats:sc>Ingrid</jats:sc>KG by augmenting the new annotated graffiti to our knowledge graph. Our generation pipeline applies RDF data conversion, link discovery and data fusion approaches to the original data. The current version of <jats:sc>Ingrid</jats:sc>KG contains 460,640,154 triples and is linked to 3 other knowledge graphs by over 200,000 links. In our use case studies, we demonstrate the usefulness of our knowledge graph for different applications.</jats:p>}},
  author       = {{Sherif, Mohamed Ahmed and da Silva, Ana Alexandra Morim and Pestryakova, Svetlana and Ahmed, Abdullah Fathi and Niemann, Sven and Ngomo, Axel-Cyrille Ngonga}},
  issn         = {{2052-4463}},
  journal      = {{Scientific Data}},
  keywords     = {{Library and Information Sciences, Statistics, Probability and Uncertainty, Computer Science Applications, Education, Information Systems, Statistics and Probability}},
  number       = {{1}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{IngridKG: A FAIR Knowledge Graph of Graffiti}}},
  doi          = {{10.1038/s41597-023-02199-8}},
  volume       = {{10}},
  year         = {{2023}},
}

@article{45872,
  author       = {{Trier, Matthias and Kundisch, Dennis and Beverungen, Daniel and Müller, Oliver and Schryen, Guido and Mirbabaie, Milad and Trang, Simon}},
  issn         = {{2363-7005}},
  journal      = {{Business &amp; Information Systems Engineering}},
  keywords     = {{Information Systems}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Digital Responsibility}}},
  doi          = {{10.1007/s12599-023-00822-x}},
  year         = {{2023}},
}

@article{44143,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Working conditions of knowledge workers have been subject to rapid change recently. Digital nomadism is no longer a phenomenon that relates only to entrepreneurs, freelancers, and gig workers. Corporate employees, too, have begun to uncouple their work from stationary (home) offices and 9-to-5 schedules. However, pursuing a permanent job in a corporate environment is still subject to fundamentally different values than postulated by the original notion of digital nomadism. Therefore, this paper explores the work identity of what is referred to as ‘corporate nomads’. By drawing on identity theory and the results of semi-structured interviews, the paper proposes a conceptualization of the corporate nomad archetype and presents nine salient identity issues of corporate nomads (e.g., holding multiple contradictory identities, the flexibility paradox, or collaboration constraints). By introducing the ‘corporate nomad’ archetype to the Information Systems literature, this article helps to rethink established conceptions of “home office” and socio-spatial configurations of knowledge work.</jats:p>}},
  author       = {{Marx, Julian and Stieglitz, Stefan and Brünker, Felix and Mirbabaie, Milad}},
  issn         = {{2363-7005}},
  journal      = {{Business &amp; Information Systems Engineering}},
  keywords     = {{Information Systems}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Home (Office) is where your Heart is}}},
  doi          = {{10.1007/s12599-023-00807-w}},
  year         = {{2023}},
}

@article{45458,
  author       = {{Stieglitz, Stefan and Mirbabaie, Milad and Deubel, Annika and Braun, Lea-Marie and Kissmer, Tobias}},
  issn         = {{0268-4012}},
  journal      = {{International Journal of Information Management}},
  keywords     = {{Library and Information Sciences, Computer Networks and Communications, Information Systems}},
  publisher    = {{Elsevier BV}},
  title        = {{{The potential of digital nudging to bridge the gap between environmental attitude and behavior in the usage of smart home applications}}},
  doi          = {{10.1016/j.ijinfomgt.2023.102665}},
  volume       = {{72}},
  year         = {{2023}},
}

@article{29843,
  author       = {{Castenow, Jannik and Kling, Peter and Knollmann, Till and Meyer auf der Heide, Friedhelm}},
  issn         = {{0890-5401}},
  journal      = {{Information and Computation}},
  keywords     = {{Computational Theory and Mathematics, Computer Science Applications, Information Systems, Theoretical Computer Science}},
  publisher    = {{Elsevier BV}},
  title        = {{{A Discrete and Continuous Study of the Max-Chain-Formation Problem}}},
  doi          = {{10.1016/j.ic.2022.104877}},
  year         = {{2022}},
}

@article{32866,
  author       = {{Shollo, Arisa and Hopf, Konstantin and Thiess, Tiemo and Müller, Oliver}},
  issn         = {{0963-8687}},
  journal      = {{The Journal of Strategic Information Systems}},
  keywords     = {{Information Systems and Management, Information Systems, Management Information Systems}},
  number       = {{3}},
  publisher    = {{Elsevier BV}},
  title        = {{{Shifting ML value creation mechanisms: A process model of ML value creation}}},
  doi          = {{10.1016/j.jsis.2022.101734}},
  volume       = {{31}},
  year         = {{2022}},
}

@article{35741,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Business process management (BPM) drives corporate success through effective and efficient processes. In recent decades, knowledge has been accumulated regarding the identification, discovery, analysis, design, implementation, and monitoring of business processes. This includes methods and tools for tackling various kinds of process change such as continuous process improvement, process reengineering, process innovation, and process drift. However, exogenous shocks, which lead to unintentional and radical process change, have been neglected in BPM research although they severely affect an organization’s context, strategy, and business processes. This research note conceptualizes the interplay of exogenous shocks and BPM in terms of the effects that such shocks can have on organizations’ overall process performance over time. On this foundation, related challenges and opportunities for BPM via several rounds of idea generation and consolidation within a diverse team of BPM scholars are identified. The paper discusses findings in light of extant literature from BPM and related disciplines, as well as present avenues for future (BPM) research to invigorate the academic discourse on the topic.</jats:p>}},
  author       = {{Röglinger, Maximilian and Plattfaut, Ralf and Borghoff, Vincent and Kerpedzhiev, Georgi and Becker, Jörg and Beverungen, Daniel and vom Brocke, Jan and Van Looy, Amy and del-Río-Ortega, Adela and Rinderle-Ma, Stefanie and Rosemann, Michael and Santoro, Flavia Maria and Trkman, Peter}},
  issn         = {{2363-7005}},
  journal      = {{Business & Information Systems Engineering}},
  keywords     = {{Information Systems, Business process management, Exogenous shocks, Challenges, Opportunities}},
  number       = {{5}},
  pages        = {{669--687}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Exogenous Shocks and Business Process Management}}},
  doi          = {{10.1007/s12599-021-00740-w}},
  volume       = {{64}},
  year         = {{2022}},
}

@article{36961,
  author       = {{Constantiou, Ioanna and Mukkamala, Alivelu and Sjöklint, Mimmi and Trier, Matthias}},
  issn         = {{0960-085X}},
  journal      = {{European Journal of Information Systems}},
  keywords     = {{Library and Information Sciences, Information Systems}},
  pages        = {{1--21}},
  publisher    = {{Informa UK Limited}},
  title        = {{{Engaging with self-tracking applications: how do users respond to their performance data?}}},
  doi          = {{10.1080/0960085x.2022.2081096}},
  year         = {{2022}},
}

@inproceedings{37140,
  abstract     = {{<jats:p>Social media have become not only integral parts of our private and professional lives, but also an indispensable source of data for empirical research across a variety of academic disciplines. Applying a Social Media Analytics (SMA) methodology, however, imposes heavy ethical challenges on researchers. Scholars in the Information Systems (IS) discipline must deal with a patchwork of ethical frameworks, regulations, and (missing) institutional support. To initiate a debate on how to develop a common understanding of SMA research ethics, this paper compiles a scoping review of extant literature and suggests a research agenda for IS scholarship on this matter. The review yields a total of eight fundamental principles of ethical SMA research, which provide a starting point to guiding individual researchers towards more ethical conduct. At the same time, this work unearths a multitude of intricate dilemmas that are currently unresolved. The findings of this review will encourage IS scholarship to find its own voice in the debate about social media research ethics.</jats:p>}},
  author       = {{Marx, Julian and Mirbabaie, Milad}},
  booktitle    = {{Australasian Journal of Information Systems}},
  issn         = {{1449-8618}},
  keywords     = {{Information Systems and Management, Human-Computer Interaction, Business, Management and Accounting (miscellaneous), Information Systems}},
  publisher    = {{Australian Journal of Information Systems}},
  title        = {{{The Investigator’s Dilemma - A Review of Social Media Analytics Research Ethics in Information Systems}}},
  doi          = {{10.3127/ajis.v26i0.3287}},
  volume       = {{26}},
  year         = {{2022}},
}

@article{37148,
  author       = {{Stieglitz, Stefan and Hofeditz, Lennart and Brünker, Felix and Ehnis, Christian and Mirbabaie, Milad and Ross, Björn}},
  issn         = {{0268-4012}},
  journal      = {{International Journal of Information Management}},
  keywords     = {{Library and Information Sciences, Computer Networks and Communications, Information Systems}},
  publisher    = {{Elsevier BV}},
  title        = {{{How crises are different - Design principles for conversational agents to support Emergency Management Agencies}}},
  doi          = {{10.1016/j.ijinfomgt.2021.102469}},
  volume       = {{63}},
  year         = {{2022}},
}

