Intervention Effect Rates as a Path to Research Relevance : Information Systems Security Example
Siponen, M., & Baskerville, R. L. (2018). Intervention Effect Rates as a Path to Research Relevance : Information Systems Security Example. Journal of the Association for Information Systems, 19(4), Article 4. https://doi.org/10.17705/1jais.00491
Julkaistu sarjassa
Journal of the Association for Information SystemsPäivämäärä
2018Tekijänoikeudet
© the Authors & Association for Information Systems, 2018.
In the current information systems security (ISS) research, new theory contributions are especially valued. This
research typically reflects the following formula: Suggest a new theory (or set of constructs) of ISS and show that it
is empirically supported, then suggest another new theory (or set of constructs with some linkages) and show that it
is empirically supported, and so on. Despite the merits of this approach, it leaves out many important scientific
aspects. For example, after more than 30 years of ISS research, (1) we know little about the conditions and situations
to which new theories (or constructs) do not apply; (2) we do not know which new theories are more effective than
others in solving an ISS problem; and (3) we have not demonstrated that our best research, or new theoretical
contributions, can beat industry best practices or practitioners’ intuitive approaches. We suggest that ISS research be
examined in terms of long-term research programs comprising four levels: metalevel research, basic research,
applied research, and postintervention research. The ultimate success of such programs does not entail new theories,
“contextualized theories,” or adding IT artifacts to theories; rather, it hinges on the question of which program can
demonstrate the best intervention effect rate for a given ISS problem. The lack of demonstrated intervention
effectiveness (e.g., by showing treatment effect rates) is one important inhibitor that may prevent ISS research from
achieving relevance in practice. Without reporting such evidence, ISS research cannot overpower the folklore, fads,
or industry “best practices” that often guide operations. With such treatment effect rates, evidence-based practice
may become more justifiable. We believe that our ideas also can be applied to information systems research in
general.
...
Julkaisija
Association for Information SystemsISSN Hae Julkaisufoorumista
1536-9323Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/28047785
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
On research work in information systems: Guidelines, recommendations and examples
Järvinen, Pertti (2021)The most positive aspect of science is that the participants (researchers, reviewers and editors) control and evaluate their work themselves. Therefore they must be supported in one way or another. Fortunately, guidelines ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
A Conceptual Framework and Research Agenda for Harnessing Institutional Work in Green Information Systems
Lumivalo, Juuli; Elo, Jenny; Salmenautio, Niina (Association for Information Systems, 2024)This study advances the field of Green Information Systems (IS) by conceptualizing the role of institutions (humanly devised rules, norms, and beliefs) in sustainability transitions with IS. We propose a framework for ... -
On Protection of the Next-Generation Mobile Networks Against Adversarial Examples
Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo (Springer, 2024)As artificial intelligence (AI) has become an integral part of modern mobile networks, there is an increasing concern about vulnerabilities of intelligent machine learning (ML)-driven network components to adversarial ... -
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
Xin, Tong; Siponen, Mikko; Chen, Sihua (Taylor & Francis, 2022)According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.