You have to read two papers regarding the selected topic (Or
You have to read two papers regarding the selected topic (Organizational Culture Theory-highlighted on the attached file ReadingPackages) and do more research then fill the theory fact sheet (attached) After that put together 10 ppt slides to present the topic (more details regarding the contents of the ppt presentation on the attached file named READING ASSIGNMENT)
READING ASSIGNMENT AND PRESENTATION OF SCIENTIFIC PAPERS
At the beginning of the lecture, students select a reading package of scientific papers (academic journal articles and conference papers) from a list. These scientific papers are to be researched and read. Students are to identify the key points from each reading package and then present them in class.
The theory(s) covered in the articles (e.g., Socio-technical Theory) should be summarized in a one-page theory fact sheet ("1-pager"). The fact sheet should be presented to an audience with general prior knowledge of the field, but without specific knowledge of the theory(s) in question (i.e., other students).
The Word template provided is to be used for the theory fact sheet.
Submission: Please submit the theory fact sheet in Word format (.docx or .odt). The collected fact sheets will be made available to all participants as one further source of preparation for the final exam. Presentation The presentation should include:
– Context of the respective theory/s – Explanation of the underlying theory/s (cause-effect relationships, influencing factors, etc.) – Key findings and recommendations for action – Discussion of the significance and implications of the findings for digitalization in society – 2 to 3 prepared discussion questions for questions and answers
The presentation should not string together Paper 1 -> Paper 2 -> Paper n … but should present the respective theory and discuss the essential findings of the papers and their significance!
Length of the presentation:
· Maximum length of the presentation 10 minutes
· Questions and answers 5 minutes (prepare 2 to 3 questions for discussion)
Be creative and do not bore the audience!
If slides are used, a maximum number of 10 slides (or an equivalent number of animated slide combinations or Prezi moves) should not be exceeded, although a number of 7 to 8 slides may be considered sufficient.
Instructions for good slide design can be found here:
https://www.ncsl.org/legislators-staff/legislative-staff/legislative-staff-coordinating-committee/tips-for-making-effective- powerpoint-presentations.aspx
Evaluation of the presentation: The evaluation of the seminar presentation considers the following components:
· Content and match to the selected reading package
· Structure of the presentation format
· Accuracy and understandability of the theory and findings
· Involvement of the audience
· Originality and creativity
· Communication skills (clear speech, pace, and language)
· Handling of questions
,
Reading listWinter semester 2022/23 Version 24.09.2022
Reading
Package
No.
Theories Papers
Information Systems Foundational Theories
Structuration Theory Orlikowski, W.J. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations. Organization Science, 3 (3), 398-
427.
Structuration Theory Orlikowski, W.J. and Robey, D. (1991). Information Technology and the Structuring of Organizations. Information Systems Research, 2 (2),
143-169.
Structuration Theory Walsham, G. and Han, C.K. (1991) Structuration theory and information systems research. Journal of Applied Systems Analysis 17: 77-85.
Institutional Theory Barley, S.R and Tolbert, P.S. (1997). Institutionalization and structuration: studying the links between action and institution. Organization
Studies 18 (1): 93-118.
Institutional Theory Orlikowski, W. J., & Barley, S. R. (2001). Technology and institutions: What can research on information technology and research on
organizations learn from each other? MIS Quarterly, 25(2), 145.
Design Science Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28 (1), 75-105.
Design Science Romme, A. G. L. (2003). Making a difference: Organization as design. Organization science, 14(5), 558-573.
Design Science Baskerville, R., Baiyere, A., Gregor, S., Hevner, A., & Rossi, M. (2018). Design science research contributions: finding a balance between
artifact and theory. Journal of the Association for Information Systems, 19(5), 3.
General Systems Theory Mora, M.; Gelman, O.; Forgionne, G.; Petkov, D.; Cano, J. (2007). Integrating the Fragmented Pieces of IS research Paradigms and
Frameworks: A systems Approach. Information Resources Management Journal, 20(2), pp.1-22.
General Systems Theory Edward J. Garrity, (2002) "Synthesizing User Centered and Designer Centered IS Development Approaches Using General Systems Theory",
IS Frontiers, Vol. 3, No. 1.
Social Theories for the Information Society
Socio-technical Theory Bostrom, R. P., & Heinen, J. S. (1977). MIS problems and failures: A socio-technical perspective. Part I: The causes. MIS quarterly, 17-32.
Socio-technical Theory Bostrom, R. P., & Heinen, J. S. (1977). MIS problems and failures: a socio-technical perspective, part II: the application of socio-technical
theory. MIS quarterly, 11-28.
Socio-technical Theory Alter, S., 2003, 18 Reasons Why IT-Reliant Work Systems Should Replace “The IT Artefact” as the Core Subject Matter of the IS Field,
Communications of the AIS, Volume 12, Article 23.
Socio-technical Theory Keen, Peter G. W. 1981. Information system and organizational change. Communications of the ACM, 24(1): 24-33.
Critical Social Theory Ngwenyama, O. K. (1991). The critical social theory approach to information systems: problems and challenges. Information systems
research: Contemporary approaches and emergent traditions, 267-280
Critical Social Theory Klein, H. K., & Huynh, M. Q. (2004). The critical social theory of Jürgen Habermas and its implications for IS research. Social theory and
philosophy for information systems, 157-237.
Absorptive Capacity Theory Cohen W., and D. Levinthal. 1990. "Absorptive capacity: a new perspective on learning and innovation." Administrative Science Quarterly
35(1) pp 128-152.
Absorptive Capacity Theory Ko, D.G., Kirsch, L.J., and King, W.R. 2005. "Antecedents of Knowledge Transfer from Consultants to Clients in Enterprise System
Implementations," MIS Quarterly (29:1), Mar, pp. 59-85.
Absorptive Capacity Theory,
IS Development
Tiwana, A., and McLean, E.R. 2005. "Expertise Integration and Creativity in Information Systems Development." Journal of Management
Information Systems (22:1), Sum, pp. 13-43.
Absorptive Capacity Theory Armstrong, C.P., and Sambamurthy, V. 1999. "Information Technology Assimilation in Firms: The Influence of Senior Leadership and IT
Infrastructures" Information Systems Research (10:4), Dec, pp. 304-327.
Absorptive Capacity Theory Martinez-Caro, E., Cepeda-Carrión, G., Cegarra-Navarro, J. G., & Garcia-Perez, A. (2020). The effect of information technology assimilation
on firm performance in B2B scenarios. Industrial Management & Data Systems, 120(12), 2269-2296.
Social Capital Theory Wasko, M. M., & Faraj, S. (2005). Why should I share? Examining social capital and knowledge contribution in electronic networks of
practice. MIS quarterly, 35-57.
Social Capital Theory Yuan, Y.C., Gay, G., and Hembrooke, H. "Focused Activities and the Development of Social Capital in a Distributed Learning Community,"
Information Society (22:1) 2006, p 25.
Social Cognitive Theory Carillo, K. D. (2010). Social cognitive theory in is research–literature review, criticism, and research agenda. In Proceedings of the
International Conference on Information systems, Technology and management (pp. 20-31). Springer.
Social Cognitive Theory Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal
study. MIS quarterly, 145-158.
Social Cognitive Theory Cai, Y., & Shi, W. (2020). The influence of the community climate on users’ knowledge-sharing intention: the social cognitive theory
perspective. Behaviour & Information Technology, 1-17.
Social Learning Theory Chen, A., Lu, Y., & Wang, B. (2017). Customers’ purchase decision-making process in social commerce: A social learning perspective.
International Journal of Information Management, 37(6), 627-638.
Social Learning Theory D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A
deterrence approach. Information systems research, 20(1), 79-98.
Social Exchange Theory Homans, G. C. (1958). Social behavior as exchange. American journal of sociology, 63(6), 597-606.
Social Exchange Theory Posey, C., Lowry, P. B., Roberts, T. L., & Ellis, T. S. (2010). Proposing the online community self-disclosure model: the case of working
professionals in France and the UK who use online communities. European journal of information systems, 19(2), 181-195.
Social Exchange Theory Kern, T & Willcocks, LP. 2000. Exploring information technology outsourcing relationships: Theory and practice, Journal of Strategic
Information Systems, 9(2000): 321-350
Social Exchange Theory Young-Ybarra, C., & Wiersema, M. (1999). Strategic flexibility in information technology alliances: The influence of transaction cost
economics and social exchange theory. Organization science, 10(4), 439-459.
Sociomaterialism Theory Orlikowski, W. J. (2007). Sociomaterial practices: Exploring technology at work. Organization Studies, 28(9), 1435–1448.
Sociomaterialism Theory Kim, G., Shin, B., & Kwon, O. (2012). Investigating the value of sociomaterialism in conceptualizing it capability of a firm. Journal of
Management Information Systems, 29(3), 327–362.
Hermeneutics Chalmers, M. "Hermeneutics, information and representation," European Journal of Information Systems (13:3) 2004, p 210.
Hermeneutics Klein, H.K., and Myers, M.D. "A set of principles for conducting and evaluating interpretive field studies in information systems," MIS
Quarterly (23:1) 1999, p 67.
R1 Structuration Theory Giddens, A. (1984). The Constitution of Society. University of California Press, Berkeley.
5
8
12
2
1
7
10
11
6
9
3
4
14
13
Ethics
Hermeneutics Hirschheim, R., and Klein, H.K. "Realizing emancipatory principles in information systems development: The case for ETHICS," MIS Quarterly
(18:1) 1994, p 83.
Hermeneutics Mingers, J., & Walsham, G. (2010). Toward ethical information systems: The contribution of discourse ethics. MIS quarterly, 833-854.
Value Sensitive Design van den Hoven, J. (2017). Ethics for the digital age: Where are the moral specs?.In Informatics in the Future (pp. 65-76). Springer, Cham.
Material Value Ethics, Value-
based Engineering
Spiekermann, S., & Winkler, T. (2021). Value-based engineering for ethics by design. IEEE Transactions, forthcoming.
Value-based Engineering Bednar, K., Spiekermann, S., & Langheinrich, M. (2019). Engineering Privacy by Design: Are engineers ready to live up to the challenge?. The
Information Society, 35(3), 122-142.
Human and material agency Leonardi, P. M. (2011). When flexible routines meet flexible technologies: Affordance, constraint, and the imbrication of human and
material agencies. MIS quarterly, 147-167.
Affordance Account of
Value Embedding in
Technology
Klenk, M. How Do Technological Artefacts Embody Moral Values? Philosophy & Technology, 1-20.
Design Science Benke, I., Feine, J., Venable, J. R., & Maedche, A. (2020). On Implementing Ethical Principles in Design Science Research. AIS Transactions on
Human-Computer Interaction, 12(4), 206-227.
Design Science, Value
Sensitive Design
Heger, O. (2019). Value Sensitive Design in Design Science Research Projects: The Cases of Affective Technology and Healthcare Technology.
In [email protected] Wirtschaftsinformatik (pp. 17-26)
Value Sensitive Design,
Value-Based Engineering
Winkler, T., & Spiekermann, S. (2021). Twenty years of value sensitive design: a review of methodological practices in VSD projects. Ethics
and Information Technology, 23(1), 17-21.
Value Sensitive Design Jacobs, N., & Huldtgren, A. (2021). Why value sensitive design needs ethical commitments. Ethics and information technology, 23(1), 23-26.
Value Sensitive Design Umbrello, S. (2018). The moral psychology of value sensitive design: the methodological issues of moral intuitions for responsible
innovation. Journal of Responsible Innovation, 5(2), 186-200.
Leadership and Digital Society Leaders
R2
Organisational Culture
Theory
Schein, E. (2004). Organizational culture and leadership (3rd ed., The Jossey-Bass business & management series). Jossey-Bass.
verfügbar in UB Salzburg:
FB Naturwissenschaften Hauptlesesaal 97.2-1
FB Rechtswissenschaften FSH Wirtschaftswissenschaften (3602) BW B 234(3)
Organisational Culture
Theory
Bradley, R. V., J. Pridmore, T. A. Byrd, "Information Systems Success in the Context of Different Corporate Cultural Types: An Empirical
Investigation," Journal of Management Information Systems (23:2), 2006, pp. 267-294.
Organisational Culture
Theory
Robey, D., and Markus, M. L. “Ritual in Information System Design,” MIS Quarterly (8:1), 1984, pp. 5-15.
Applied phronetic
leadership
Hamaya, S., & Oya, T. (2013). Phronetic leaders: Designing new business, organization and society. FUJITSU Science Technology Journal,
49(4), 402-406.
Applied phronetic
leadership
Ding, W., Choi, E., & Aoyama, A. (2019). Relational study of wise (phronetic) leadership, knowledge management capability, and innovation
performance. Asia Pacific Management Review, 24(4), 310-317.
Applied phronetic
leadership
Kane, G. C., Phillips, A. N., Copulsky, J., & Andrus, G. (2019). How digital leadership is (n't) different. MIT Sloan Management Review, 60(3),
34-39.
Applied phronetic
leadership
Jakubik, M., & Berazhny, I. (2017). Rethinking Leadership and It´ s Practices in the Digital Era. In Managing the Global Economy. Proceedings
of the Management International Conference, Monastier di Treviso, Italy, 24–27 May, 2017. University of Primorska Press.
Accountability Theory Vance, A., Lowry, P. B., & Eggett, D. (2013). Using accountability to reduce access policy violations in information systems. Journal of
Management Information Systems, 29(4), 263-290.
Accountability Theory Vance, A., Lowry, P. B., & Eggett, D. (2015). Increasing Accountability Through User-Interface Design Artifacts: A new approach to the
problem of access policy violations. MIS Quarterly, 39(2), 345-366
Social Learning Theory Brown, M. E., Treviño, L. K., & Harrison, D. A. (2005). Ethical leadership: A social learning perspective for construct development and testing.
Organizational behavior and human decision processes, 97(2), 117-134.
Social Learning Theory Manz, C. C., & Sims Jr, H. P. (1980). Self-management as a substitute for leadership: A social learning theory perspective. Academy of
Management review, 5(3), 361-367.
Social Learning Theory Bai, Y., Lin, L., & Liu, J. T. (2019). Leveraging the employee voice: a multi-level social learning perspective of ethical leadership. The
International Journal of Human Resource Management, 30(12), 1869-1901.
Communication and Collaboration between Social Actors
Socio-technical Theory Chen, L., & Nath, R. (2008). A socio-technical perspective of mobile work. Information Knowledge Systems Management, 7(1, 2), 41-60.
Socio-technical Theory Durward, D., Simmert, B., Peters, C., Blohm, I., & Leimeister, J. M. (2019, January). How to empower the workforce-analyzing internal crowd
work as a neo-socio-technical system. In Proceedings of the 52nd Hawaii international conference on system sciences.
Adaptive Structuration
Theory
Gopal, A., Bostrom, R. P., & Chin, W. W. (1992). Applying adaptive structuring theory to investigate the process of group support systems
use. Journal of Management Information Systems, 9(3), 45.
Adaptive Structuration
Theory
Lam, S. S. K. (1997). The effects of group decision support systems and task structures on group communication and decision quality.
Journal of Management Information Systems, 13(4), 193.
Boundary Object Theory,
Grounded Theory
Star, S.L. 2010. "This is Not a Boundary Object: Reflections on the Origin of a Concept," Science, Technology, & Human Values (35:5), pp. 601-
617.
Boundary Object Theory Nicolini, D., Mengis, J., and Swan, J. 2012. "Understanding the Role of Objects in Cross-Disciplinary Collaboration," Organization Science
(23:3), pp. 612-629.
Boundary Object Theory Pawlowski, S.D., and Robey, D. 2004. "Bridging User Organizations: Knowledge Brokering and the Work of Information Technology
Professionals," MIS Quarterly (28:4), pp. 645-672.
Protection Motivation
Theory
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp.
549-566
Protection Motivation
Theory
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security
Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
Protection Motivation
Theory
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect
organizational information assets,” Journal of Management Information Systems (JMIS), 32 (4), 179-214.
Protection Motivation
Theory
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear
appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
Innovation in the Information Society
Technology Acceptance
Model
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.
Technology Acceptance
Model
Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision sciences, 39(2), 273-315.
Technology Acceptance
Model
Koul, S., & Eydgahi, A. (2018). Utilizing technology acceptance model (TAM) for driverless car technology adoption. Journal of Technology
Management & Innovation, 13(4), 37-46.
Actor Network Theory Latour, B. (2011). Network theory: networks, societies, spheres: Reflections of an actor-network theorist. International Journal of
Communication, 5 (2011), 796-810.
Actor Network Theory Miettinen, R. (1999). The riddle of things: Activity theory and actor-network theory as approaches to studying innovations. Mind, Culture,
and Activity, 6(3), 170-195.
Actor Network Theory Gao, P. (2005). Using actor-network theory to analyse strategy formulation. Information Systems Journal, 15(3), 255-275.
Institutional Theory Swanson, E. B., & Ramiller, N. C. (2004). Innovating mindfully with information Technology. MIS Quarterly, 28(4), 553-583.
Institutional Theory Hinings, B., Gegenhuber, T., & Greenwood, R. (2018). Digital innovation and transformation: An institutional perspective. Information and
Organization, 28(1), 52-61.
Cross-theoretical
approaches, Innovation
agency
Kohli, R., & Melville, N. P. (2019). Digital innovation: A review and synthesis. Information Systems Journal, 29(1), 200-223
Cross-theoretical
approaches, Innovation
agency
Nambisan, S., Lyytinen, K., Majchrzak, A., & Song, M. (2017). Digital Innovation Management: Reinventing innovation management research
in a digital world. MIS Quarterly, 41(1), 223-238.
27
21
19
31
26
18
30
22
17
20
16
28
29
15
23
24
25
,
Insert Prename, Surname of all students
Winter Term 2022/23
Theory Factsheet: Insert name of theory
Level of analysis |
Insert levels of analysis, e.g., organisation, individual, social |
Dependent construct(s) |
Please insert the dependent construct(s) of the theory |
Independent construct(s) |
Please insert the independent construct(s) of the theory |
Short description of the theory
Please describe the theory in full sentences.
Cause-Effect Model
Please insert a visual diagram of the cause-effect relationships or factor model of the theory (if available).
Applications of the theory
Please describe for which purposes / in which fields the theory has been applied.
Which relevance does the theory have for digitalization in organizations?
Criticism
Describe alternative views, potential critique, and open discussion on the theory.
References
Insert sources and references used in this factsheet in APA 7th style.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.