@article{45458,
  author       = {{Stieglitz, Stefan and Mirbabaie, Milad and Deubel, Annika and Braun, Lea-Marie and Kissmer, Tobias}},
  issn         = {{0268-4012}},
  journal      = {{International Journal of Information Management}},
  keywords     = {{Library and Information Sciences, Computer Networks and Communications, Information Systems}},
  publisher    = {{Elsevier BV}},
  title        = {{{The potential of digital nudging to bridge the gap between environmental attitude and behavior in the usage of smart home applications}}},
  doi          = {{10.1016/j.ijinfomgt.2023.102665}},
  volume       = {{72}},
  year         = {{2023}},
}

@article{45824,
  abstract     = {{<jats:p>As cognitive function is critical for muscle coordination, cognitive training may also improve neuromuscular control strategy and knee function following an anterior cruciate ligament reconstruction (ACLR). The purpose of this case-control study was to examine the effects of cognitive training on joint stiffness regulation in response to negative visual stimuli and knee function following ACLR. A total of 20 ACLR patients and 20 healthy controls received four weeks of online cognitive training. Executive function, joint stiffness in response to emotionally evocative visual stimuli (neutral, fearful, knee injury related), and knee function outcomes before and after the intervention were compared. Both groups improved executive function following the intervention (p = 0.005). The ACLR group had greater mid-range stiffness in response to fearful (p = 0.024) and injury-related pictures (p = 0.017) than neutral contents before the intervention, while no post-intervention stiffness differences were observed among picture types. The ACLR group showed better single-legged hop for distance after cognitive training (p = 0.047), while the healthy group demonstrated no improvement. Cognitive training enhanced executive function, which may reduce joint stiffness dysregulation in response to emotionally arousing images and improve knee function in ACLR patients, presumably by facilitating neural processing necessary for neuromuscular control.</jats:p>}},
  author       = {{An, Yong Woo and Kim, Kyung-Min and DiTrani Lobacz, Andrea and Baumeister, Jochen and Higginson, Jill S. and Rosen, Jeffrey and Swanik, Charles Buz}},
  issn         = {{2227-9032}},
  journal      = {{Healthcare}},
  keywords     = {{Health Information Management, Health Informatics, Health Policy, Leadership and Management}},
  number       = {{13}},
  publisher    = {{MDPI AG}},
  title        = {{{Cognitive Training Improves Joint Stiffness Regulation and Function in ACLR Patients Compared to Healthy Controls}}},
  doi          = {{10.3390/healthcare11131875}},
  volume       = {{11}},
  year         = {{2023}},
}

@article{29843,
  author       = {{Castenow, Jannik and Kling, Peter and Knollmann, Till and Meyer auf der Heide, Friedhelm}},
  issn         = {{0890-5401}},
  journal      = {{Information and Computation}},
  keywords     = {{Computational Theory and Mathematics, Computer Science Applications, Information Systems, Theoretical Computer Science}},
  publisher    = {{Elsevier BV}},
  title        = {{{A Discrete and Continuous Study of the Max-Chain-Formation Problem}}},
  doi          = {{10.1016/j.ic.2022.104877}},
  year         = {{2022}},
}

@article{32866,
  author       = {{Shollo, Arisa and Hopf, Konstantin and Thiess, Tiemo and Müller, Oliver}},
  issn         = {{0963-8687}},
  journal      = {{The Journal of Strategic Information Systems}},
  keywords     = {{Information Systems and Management, Information Systems, Management Information Systems}},
  number       = {{3}},
  publisher    = {{Elsevier BV}},
  title        = {{{Shifting ML value creation mechanisms: A process model of ML value creation}}},
  doi          = {{10.1016/j.jsis.2022.101734}},
  volume       = {{31}},
  year         = {{2022}},
}

@inproceedings{33957,
  abstract     = {{Manufacturing companies are challenged to make the increasingly complex work processes equally manageable for all employees to prevent an impending loss of competence. In this contribution, an intelligent assistance system is proposed enabling employees to help themselves in the workplace and provide them with competence-related support. This results in increasing the short- and long-term efficiency of problem solving in companies.}},
  author       = {{Deppe, Sahar and Brandt, Lukas and Brünninghaus, Marc and Papenkordt, Jörg and Heindorf, Stefan and Tschirner-Vinke, Gudrun}},
  keywords     = {{Assistance system, Knowledge graph, Information retrieval, Neural networks, AR}},
  location     = {{Stuttgart}},
  title        = {{{AI-Based Assistance System for Manufacturing}}},
  doi          = {{10.1109/ETFA52439.2022.9921520}},
  year         = {{2022}},
}

@article{35741,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Business process management (BPM) drives corporate success through effective and efficient processes. In recent decades, knowledge has been accumulated regarding the identification, discovery, analysis, design, implementation, and monitoring of business processes. This includes methods and tools for tackling various kinds of process change such as continuous process improvement, process reengineering, process innovation, and process drift. However, exogenous shocks, which lead to unintentional and radical process change, have been neglected in BPM research although they severely affect an organization’s context, strategy, and business processes. This research note conceptualizes the interplay of exogenous shocks and BPM in terms of the effects that such shocks can have on organizations’ overall process performance over time. On this foundation, related challenges and opportunities for BPM via several rounds of idea generation and consolidation within a diverse team of BPM scholars are identified. The paper discusses findings in light of extant literature from BPM and related disciplines, as well as present avenues for future (BPM) research to invigorate the academic discourse on the topic.</jats:p>}},
  author       = {{Röglinger, Maximilian and Plattfaut, Ralf and Borghoff, Vincent and Kerpedzhiev, Georgi and Becker, Jörg and Beverungen, Daniel and vom Brocke, Jan and Van Looy, Amy and del-Río-Ortega, Adela and Rinderle-Ma, Stefanie and Rosemann, Michael and Santoro, Flavia Maria and Trkman, Peter}},
  issn         = {{2363-7005}},
  journal      = {{Business & Information Systems Engineering}},
  keywords     = {{Information Systems, Business process management, Exogenous shocks, Challenges, Opportunities}},
  number       = {{5}},
  pages        = {{669--687}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Exogenous Shocks and Business Process Management}}},
  doi          = {{10.1007/s12599-021-00740-w}},
  volume       = {{64}},
  year         = {{2022}},
}

@article{36961,
  author       = {{Constantiou, Ioanna and Mukkamala, Alivelu and Sjöklint, Mimmi and Trier, Matthias}},
  issn         = {{0960-085X}},
  journal      = {{European Journal of Information Systems}},
  keywords     = {{Library and Information Sciences, Information Systems}},
  pages        = {{1--21}},
  publisher    = {{Informa UK Limited}},
  title        = {{{Engaging with self-tracking applications: how do users respond to their performance data?}}},
  doi          = {{10.1080/0960085x.2022.2081096}},
  year         = {{2022}},
}

@inproceedings{37140,
  abstract     = {{<jats:p>Social media have become not only integral parts of our private and professional lives, but also an indispensable source of data for empirical research across a variety of academic disciplines. Applying a Social Media Analytics (SMA) methodology, however, imposes heavy ethical challenges on researchers. Scholars in the Information Systems (IS) discipline must deal with a patchwork of ethical frameworks, regulations, and (missing) institutional support. To initiate a debate on how to develop a common understanding of SMA research ethics, this paper compiles a scoping review of extant literature and suggests a research agenda for IS scholarship on this matter. The review yields a total of eight fundamental principles of ethical SMA research, which provide a starting point to guiding individual researchers towards more ethical conduct. At the same time, this work unearths a multitude of intricate dilemmas that are currently unresolved. The findings of this review will encourage IS scholarship to find its own voice in the debate about social media research ethics.</jats:p>}},
  author       = {{Marx, Julian and Mirbabaie, Milad}},
  booktitle    = {{Australasian Journal of Information Systems}},
  issn         = {{1449-8618}},
  keywords     = {{Information Systems and Management, Human-Computer Interaction, Business, Management and Accounting (miscellaneous), Information Systems}},
  publisher    = {{Australian Journal of Information Systems}},
  title        = {{{The Investigator’s Dilemma - A Review of Social Media Analytics Research Ethics in Information Systems}}},
  doi          = {{10.3127/ajis.v26i0.3287}},
  volume       = {{26}},
  year         = {{2022}},
}

@article{37148,
  author       = {{Stieglitz, Stefan and Hofeditz, Lennart and Brünker, Felix and Ehnis, Christian and Mirbabaie, Milad and Ross, Björn}},
  issn         = {{0268-4012}},
  journal      = {{International Journal of Information Management}},
  keywords     = {{Library and Information Sciences, Computer Networks and Communications, Information Systems}},
  publisher    = {{Elsevier BV}},
  title        = {{{How crises are different - Design principles for conversational agents to support Emergency Management Agencies}}},
  doi          = {{10.1016/j.ijinfomgt.2021.102469}},
  volume       = {{63}},
  year         = {{2022}},
}

@article{37147,
  author       = {{Mirbabaie, Milad and Brendel, Alfred B. and Hofeditz, Lennart}},
  issn         = {{1529-3181}},
  journal      = {{Communications of the Association for Information Systems}},
  keywords     = {{Information Systems}},
  number       = {{1}},
  pages        = {{726--753}},
  publisher    = {{Association for Information Systems}},
  title        = {{{Ethics and AI in Information Systems Research}}},
  doi          = {{10.17705/1cais.05034}},
  volume       = {{50}},
  year         = {{2022}},
}

@article{37139,
  author       = {{Mirbabaie, Milad and Stieglitz, Stefan and Marx, Julian}},
  issn         = {{2363-7005}},
  journal      = {{Business & Information Systems Engineering}},
  keywords     = {{Information Systems}},
  number       = {{2}},
  pages        = {{239--246}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Catchword: Digital Detox}}},
  doi          = {{10.1007/s12599-022-00747-x}},
  volume       = {{64}},
  year         = {{2022}},
}

@article{34617,
  author       = {{Huber, Marco and Terhörst, Philipp and Kirchbuchner, Florian and Damer, Naser and Kuijper, Arjan}},
  journal      = {{33nd British Machine Vision Conference 2022}},
  keywords     = {{Computer Vision and Pattern Recognition (cs.CV), FOS: Computer and information sciences, FOS: Computer and information sciences}},
  publisher    = {{arXiv}},
  title        = {{{Stating Comparison Score Uncertainty and Verification Decision Confidence Towards Transparent Face Recognition}}},
  doi          = {{10.48550/ARXIV.2210.10354}},
  year         = {{2022}},
}

@article{41317,
  abstract     = {{<jats:p> Service frontline encounters between customers and service providers have been subject to fundamental changes in recent years. As two major change agents, technology infusion and data privacy regulations are inextricably linked and constitute a critical ethical and societal issue. Specifically, service frontlines—as represented by human or technological agents, or some hybrid form—rely on customer data for service provision, which subjects them to privacy regulations governing the collection, submission, access, and use of any customer data thus captured. However, scant research outlines the significant implications of evolving data privacy regulations for service frontline encounters. To advance knowledge in this domain, this research distills six key dimensions of global data privacy regulations (fairness, data limits, transparency, control, consent, and recourse). Employing an intelligences theoretical lens, the authors theorize how these dimensions might become differentially manifest across three service frontline interface types (human-based, technology-based, and hybrid). Carefully intersecting the need for varying intelligences across data privacy regulatory dimensions with the abilities of service frontline interfaces to harness each intelligence type, this study offers a novel conceptual framework that advances research and practice. Theoretical, managerial, and policy implications unfold from the proposed framework, which also can inform a future research agenda. </jats:p>}},
  author       = {{Steinhoff, Lena and Martin, Kelly D.}},
  issn         = {{1094-6705}},
  journal      = {{Journal of Service Research}},
  keywords     = {{Organizational Behavior and Human Resource Management, Sociology and Political Science, Information Systems}},
  publisher    = {{SAGE Publications}},
  title        = {{{Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces}}},
  doi          = {{10.1177/10946705221141925}},
  year         = {{2022}},
}

@article{36083,
  author       = {{Constantiou, Ioanna and Mukkamala, Alivelu and Sjöklint, Mimmi and Trier, Matthias}},
  issn         = {{0960-085X}},
  journal      = {{European Journal of Information Systems}},
  keywords     = {{Library and Information Sciences, Information Systems, Self-Tracking, User Behaviour, Discontinuance}},
  pages        = {{1--21}},
  publisher    = {{Informa UK Limited}},
  title        = {{{Engaging with self-tracking applications: how do users respond to their performance data?}}},
  doi          = {{10.1080/0960085x.2022.2081096}},
  year         = {{2022}},
}

@article{36960,
  author       = {{Constantiou, Ioanna and Mukkamala, Alivelu and Sjöklint, Mimmi and Trier, Matthias}},
  issn         = {{0960-085X}},
  journal      = {{European Journal of Information Systems}},
  keywords     = {{Library and Information Sciences, Information Systems}},
  pages        = {{1--21}},
  publisher    = {{Informa UK Limited}},
  title        = {{{Engaging with self-tracking applications: how do users respond to their performance data?}}},
  doi          = {{10.1080/0960085x.2022.2081096}},
  year         = {{2022}},
}

@inbook{29720,
  author       = {{Passey, Don and Brinda, Torsten and Cornu, Bernard and Holvikivi, Jaana and Lewin, Cathy and Magenheim, Johannes and Morel, Raymond and Osorio, Javier and Tatnall, Arthur and Thompson, Barrie and Webb, Mary}},
  booktitle    = {{Advancing Research in Information and Communication Technology}},
  editor       = {{Goedicke, Michael and Neuhold, Erich  and Rannenberg, Kai}},
  isbn         = {{978-3-030-81700-8}},
  issn         = {{1868-422X}},
  keywords     = {{Educational technologies, Education and technologies, Digital technologies and education, Information technologies, Communication technologies, Educational technologies and research, Educational technologies and pedagogical practices, Educational technologies and policy, Educational management and technologies, Professional development and educational technologies}},
  pages        = {{129--152}},
  publisher    = {{Springer, Cham}},
  title        = {{{Computers and Education – Recognising Opportunities and Managing Challenges}}},
  doi          = {{10.1007/978-3-030-81701-5_5}},
  volume       = {{AICT-600}},
  year         = {{2021}},
}

@article{17860,
  abstract     = {{Purpose
The purpose of this paper is to identify strategic options and challenges that arise when an industrial firm moves from providing smart service toward providing a platform.

Design/methodology/approach
This conceptual study takes on a multidisciplinary research perspective that integrates concepts, theories and insights from service management and marketing, information systems and platform economics.

Findings
The paper outlines three platform types – smart data platform, smart product platform and matching platform – as strategic options for firms that wish to evolve from smart service providers to platform providers.

Research limitations/implications
Investigating smart service platforms calls for launching interdisciplinary research initiatives. Promising research avenues are outlined to span boundaries that separate different research disciplines today.

Practical implications
Managing a successful transition from providing smart service toward providing a platform requires making significant investments in IT, platform-related capabilities and skills, as well as implement new approaches toward relationship management and brand-building.

Originality/value
The findings described in this paper are valuable to researchers in multiple disciplines seeking to develop and to justify theory related to platforms in industrial scenarios.}},
  author       = {{Beverungen, Daniel and Kundisch, Dennis and Wünderlich, Nancy}},
  issn         = {{507-532}},
  journal      = {{Journal of Service Management}},
  keywords     = {{Smart service, Platform, Interdisciplinary research, Manufacturing company, Smart service provider, Platform economics, Information systems, Multi-sided markets, Business-to-business (B2B) markets}},
  number       = {{4}},
  pages        = {{507--532}},
  publisher    = {{Emerald Insight}},
  title        = {{{Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers}}},
  doi          = {{10.1108/JOSM-03-2020-0066}},
  volume       = {{32}},
  year         = {{2021}},
}

@article{37146,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Organizations increasingly introduce collaborative technologies in form of virtual assistants (VAs) to save valuable resources, especially when employees are assisted with work-related tasks. However, the effect of VAs on virtual teams and collaboration remains uncertain, particularly whether employees show social loafing (SL) tendencies, i.e., applying less effort for collective tasks compared to working alone. While extant research indicates that VAs collaboratively working in teams exert greater results, less is known about SL in virtual collaboration and how responsibility attribution alters. An online experiment with N = 102 was conducted in which participants were assisted by a VA in solving a task. The results indicate SL tendencies in virtual collaboration with VAs and that participants tend to cede responsibility to the VA. This study makes a first foray and extends the information systems (IS) literature by analyzing SL and responsibility attribution thus updates our knowledge on virtual collaboration with VAs.</jats:p>}},
  author       = {{Stieglitz, Stefan and Mirbabaie, Milad and Möllmann, Nicholas R. J. and Rzyski, Jannik}},
  issn         = {{1387-3326}},
  journal      = {{Information Systems Frontiers}},
  keywords     = {{Computer Networks and Communications, Information Systems, Theoretical Computer Science, Software}},
  number       = {{3}},
  pages        = {{745--770}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution}}},
  doi          = {{10.1007/s10796-021-10201-0}},
  volume       = {{24}},
  year         = {{2021}},
}

@article{16249,
  abstract     = {{Timing plays a crucial role in the context of information security investments. We regard timing in two dimensions, namely the time of announcement in relation to the time of investment and the time of announcement in relation to the time of a fundamental security incident. The financial value of information security investments is assessed by examining the relationship between the investment announcements and their stock market reaction focusing on the two time dimensions. Using an event study methodology, we found that both dimensions influence the stock market return of the investing organization. Our results indicate that (1) after fundamental security incidents in a given industry, the stock price will react more positively to a firm’s announcement of actual information security investments than to announcements of the intention to invest; (2) the stock price will react more positively to a firm’s announcements of the intention to invest after the fundamental security incident compared to before; and (3) the stock price will react more positively to a firm’s announcements of actual information security investments after the fundamental security incident compared to before. Overall, the lowest abnormal return can be expected when the intention to invest is announced before a fundamental information security incident and the highest return when actual investing after a fundamental information security incident in the respective industry.}},
  author       = {{Szubartowicz, Eva and Schryen, Guido}},
  journal      = {{Journal of Information System Security}},
  keywords     = {{Event Study, Information Security, Investment Announcements, Stock Price Reaction, Value of Information Security Investments}},
  number       = {{1}},
  pages        = {{3 -- 31}},
  publisher    = {{Information Institute Publishing, Washington DC, USA}},
  title        = {{{Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements}}},
  volume       = {{16}},
  year         = {{2020}},
}

@article{11946,
  abstract     = {{Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a
lack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1)
derive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs
that complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs
with different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published
in 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development
achieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant
conceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge
building activities to achieve their goals with respect to theory.}},
  author       = {{Schryen, Guido and Wagner, Gerit and Benlian, Alexander and Paré, Guy}},
  issn         = {{ 1529-3181}},
  journal      = {{Communications of the AIS}},
  keywords     = {{Literature review, knowledge development, knowledge building activities, knowledge-based typology, information systems research}},
  pages        = {{134--186}},
  title        = {{{A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field}}},
  doi          = {{10.17705/1CAIS.04607}},
  volume       = {{46}},
  year         = {{2020}},
}

