IS

Ransbotham, Sam

Topic Weight Topic Terms
0.556 community communities online members participants wikipedia social member knowledge content discussion collaboration attachment communication law
0.333 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.330 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.282 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.272 new licensing license open comparison type affiliation perpetual prior address peer question greater compared explore
0.204 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.186 qualitative methods quantitative approaches approach selection analysis criteria used mixed methodological aspects recent selecting combining
0.167 digital divide use access artifacts internet inequality libraries shift library increasingly everyday societies understand world
0.151 systems information management development presented function article discussed model personnel general organization described presents finally
0.126 effect impact affect results positive effects direct findings influence important positively model data suggest test
0.117 information issue special systems article introduction editorial including discusses published section articles reports various presented
0.116 internet peer used access web influence traditional fraud world ecology services impact cases wide home
0.114 adoption diffusion technology adopters innovation adopt process information potential innovations influence new characteristics early adopting
0.109 information types different type sources analysis develop used behavior specific conditions consider improve using alternative
0.107 model models process analysis paper management support used environment decision provides based develop use using
0.103 network networks social analysis ties structure p2p exchange externalities individual impact peer-to-peer structural growth centrality

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Kane, Gerald C. 2 Mitra, Sabyasachi 2 Fichman, Robert G. 1 Gopal, Ram D. 1
Gupta, Alok 1
algorithmic bias 1 algorithmic ethics 1 artificial intelligence 1 computer crime 1
diffusion of innovation 1 economic inequality 1 information security management 1 information systems risk management 1
Information generation 1 information retention 1 information security 1 information disclosure 1
information quality 1 Internet of things 1 longitudinal Study 1 Membership turnover 1
negative innovation 1 network analysis 1 online harassment 1 software vulnerability 1
social media 1

Articles (5)

Research Note‹Content and Collaboration: An Affiliation Network Approach to Information Quality in Online Peer Production Communities (Information Systems Research, 2016)
Authors: Abstract:
    The 15-year history of collaboration on Wikipedia offers insight into how peer production communities create knowledge. In this research, we combine disparate content and collaboration approaches through a social network analysis approach known as an affiliation network. It captures both how knowledge is transferred in a peer production network and also the underlying skills possessed by its contributors in a single methodological approach. We test this approach on the Wikipedia articles dedicated to medical information developed in a subcommunity known as a WikiProject. Overall, we find that the position of an article in the affiliation network is associated with the quality of the article. We further investigate information quality through additional qualitative and quantitative approaches including expert coders using medical students, crowdsourcing using Amazon Mechanical Turk, and visualization using network graphs. A review by fourth-year medical students indicates that the Wikipedia quality rating is a reliable measure of information quality. Amazon Mechanical Turk ratings, however, are a less reliable measure of information quality, reflecting observable content characteristics such as article length and the number of references.
Special Section IntroductionãUbiquitous IT and Digital Vulnerabilities (Information Systems Research, 2016)
Authors: Abstract:
    While information technology benefits society in numerous ways, it unfortunately also has potential to create new vulnerabilities. This special issue intends to stimulate thought and research into understanding and mitigating these vulnerabilities. We identify four mechanisms by which ubiquitous computing makes various entities (people, devices, organizations, societies, etc.) more vulnerable, including: increased visibility, enhanced cloaking, increased interconnectedness, and decreased costs. We use the papers in the special issue to explain these mechanisms, and then outline a research agenda for future work on digital vulnerabilities spanning four areas that are, or could become, significant societal problems with implications at multiple levels of analysis: Online harassment and incivility, technology-driven economic inequality, industrial Internet of Things, and algorithmic ethics and bias.
Information Disclosure and the Diffusion of Information Security Attacks (Information Systems Research, 2015)
Authors: Abstract:
    With the nearly instantaneous dissemination of information in the modern era, policies regarding the disclosure of sensitive information have become the focus of significant discussion in several contexts. The fundamental debate centers on trade-offs inherent in disclosing information that society needs, but that can also be used for nefarious purposes. Using information security as a research context, our empirical study examines the adoption of software vulnerabilities by a population of attackers. We compare attacks based on software vulnerabilities disclosed through full-disclosure and limited-disclosure mechanisms. We find that full disclosure accelerates the diffusion of attacks, increases the penetration of attacks within the target population, and increases the risk of first attack after the vulnerability is reported. Interestingly, the effect of full disclosure is greater during periods when there are more overall vulnerabilities reported, indicating that attackers may strategically focus on busy periods when the effort of security professionals is spread across many vulnerabilities. Although the aggregate volume of attacks remains unaffected by full disclosure, attacks occur earlier in the life cycle of the vulnerability. Building off our theoretical insights, we discuss the implications of our findings in more general contexts.
MEMBERSHIP TURNOVER AND COLLABORATION SUCCESS IN ONLINE COMMUNITIES: EXPLAINING RISES AND FALLS FROM GRACE IN WIKIPEDIA. (MIS Quarterly, 2011)
Authors: Abstract:
    Firms increasingly turn to online communities to create valuable information. These communities are empowered by new information technology-enabled collaborative tools, tools such as blogs, wikis, and social networks. Collaboration on these platforms is characterized by considerable membership turnover, which could have significant effects on collaborative outcomes. We hypothesize that membership retention relates in a curvilinear fashion to effective collaboration: positively up to a threshold and negatively thereafter. The longitudinal history of 2,065 featured articles on Wikipedia offers support for this hypotheses: Contributions from a mixture of new and experienced participants both increases the likelihood that an article will be promoted to featured article status and decreases the risk it will be demoted after having been promoted. These findings imply that, contrary to many of the assumptions in previous research, participant retention does not have a strictly positive effect on emerging collaborative environments. Further analysis of our data provides empirical evidence that knowledge creation and knowledge retention are actually distinct phases of community-based peer production, and that communities may on average experience more turnover than ideal during the knowledge retention phase.
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise. (Information Systems Research, 2009)
Authors: Abstract:
    No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from the perspective of the attacked organization. We distinguish between deliberate and opportunistic paths of compromise through the Internet, labeled choice and chance, and include the role of countermeasures, the Internet presence of the firm, and the attractiveness of the firm for information security compromise. Further, using one year of alert data from intrusion detection devices, we find empirical support for the key contributions of the model. We discuss the implications of the model for the emerging research stream on information security in the information systems literature.