Ep. 20 – A Ubichronic Perspective of Time (Ivaturi and Chua 2021)

In the era of ubiquitous digital technology, our perception of time is undergoing a serious paradigm shift.

Ivaturi and Chua (2021), ‘Rethinking Time: Ubichronic Time and Its Impact on Work’, European Journal of Information Systems, http://dx.doi.org/10.1080/0960085X.2021.1966326

Ep. 19 – Human in the Algorithmic Loop (Grønsund and Aanestad 2020)

Will there still be a future for human work in the hyper-automated future of algorithmic decision-making?

Grønsund T. & Aanestad M. (2020), ‘Augmenting the Algorithm: Emerging Human-in-the-Loop Work Configurations’, Journal of Strategic Information Systems, vol. 29, no. 2, https://doi.org/10.1016/j.jsis.2020.101614

Ep. 18 – Privacy Perspectives and Monero Cryptocurrency (Renwick and Gleasure 2021)

The different groups of people involved in the Monero cryptocurrency have very different feelings about privacy. How is this going to play out in the design of Monero?

Renwick R. & Gleasure R. (2021), ‘Those Who Control the Code Control the Rules: How Different Perspectives of Privacy Are Being Written Into the Code of Blockchain Systems’, Journal of Information Technology, https://doi.org/10.1177/0268396220944406

Ep. 17 – The Ontological Reversal (Baskerville et al 2020)

In the past, information systems (IS) captured and represented the lived (external) reality. Now, they are the lived reality.

Baskerville R. L., Myers M. D., & Yoo Y. (2020), ‘Digital First: The Ontological Reversal and New Challenges for Information Systems Research’, MIS Quarterly, https://doi.org/10.25300/MISQ/2020/14418

Ep. 16 – Envy on Social Media (Wu and Srite 2020)

Social media can make people feel envy. But is this always a bad thing? And what does it mean for social media platforms?

Wu J. & Srite M. (2020), ‘Envy on Social Media: The Good, the Bad and the Ugly’, International Journal of Information Management, https://doi.org/10.1016/j.ijinfomgt.2020.102255

Ep. 15 – The Future(s) of Knowledge Work Post-COVID-19 (Wang et al 2020)

The old factory paradigm is fading away, but what will replace it? We look to the digital nomads to envision some possibilities.

Wang B., Schlagwein D., Cecez-Kecmanovic D., & Cahalane M. C. (2020), ‘Beyond the Factory Paradigm: Digital Nomadism and the Digital Future(s) of Knowledge Work Post-COVID-19’, Journal of the Association for Information Systems, 21(6), pp. 1379-1401, https://aisel.aisnet.org/jais/vol21/iss6/10/

Ep. 14 – Tracing Normiefication (De Zeeuw et al 2020)

The conspiracy theory “QAnon” started in a fringe, esoteric corner of the Web. How did it become part of the mainstream public sphere?

De Zeeuw D., Hagen S., Peeters S., & Jokubauskaite E. (2020), ‘Tracing Normiefication: A Cross-Platform Analysis of the QAnon Conspiracy Theory’, First Monday, https://doi.org/10.5210/fm.v25i11.10643

Ep. 13 – Powered by Qinghuai (情怀) (Xiao et al 2020)

In Western culture, there’s social capital and virtue ethics. In Chinese culture, there’s guanxi and qinghuai.

Xiao X., Tan B., Leong C., & Tan F. T. C. (2020), ‘Powered by “Qinghuai”: The Melding of Traditional Values and Digital Entrepreneurship in Contemporary China’, Information Systems Journal, https://doi.org/10.1111/isj.12301

Ep. 12 – Web-Conferencing Affordances and Constraints (Hacker et al 2020)

The lockdowns of COVID-19 have seen a sharp increase in the use of web conferencing systems. How have these been useful, and how can we improve on these for the future?

Hacker J., Vom Brocke J., Handali J., Otto M., & Schneider J. (2020), ‘Virtually in This Together – How Web-conferencing Systems Enabled a New Virtual Togetherness During the COVID-19 Crisis’, European Journal of Information Systems, https://doi.org/10.1080/0960085X.2020.1814680

Ep. 11 – What Happens to Shadow IT? (Fürstenau et al 2020)

Sometimes people set up their own IT systems outside of what is officially supported by the IT department. When these IT systems are revealed, what happens to them?

Fürstenau D., Rothe H. & Sandner M. (2020), Leaving the Shadow: A Configurational Approach to Explain Post-Identification Outcomes of Shadow IT Systems’, Business & Information Systems Engineering, https://doi.org/10.1007/s12599-020-00635-2