Wirtschaftswissenschaftliche Fakultät

Suche

Seminar: Information Systems Research


Dozent(in): Prof. Dr. Daniel Veit; Dr. Manuel Trenz; Alexander Frey, M.Sc.; Sabrina Hauff, M.Sc; Vanessa Schäffner, M.Sc.
Termin: Anmeldung: 05.10.-18.10.2015
Gebäude/Raum: Kick-off: FW2102; Zwischenpräsentation: FW2102
Weitere Termine: Benachrichtigung: 21.10.2015
Kick-Off: 29.10.2015, 10:00 - 11:30 Uhr
Zwischenpräsentation: 13.01.2016, 14:00-18:00 Uhr
Abgabe: 29.02.2016, 12:00 Uhr
Ansprechpartner: Sabrina Hauff, M.Sc.


Zusammenfassung:

Upon the successful completion of this module, students have a basic understanding of empirical research in information systems. Topics will be chosen and assigned to students to familiarize them with the information systems research discipline. These topics include IT innovation, IT adoption and continuance, digital strategy, business models, pricing, cloud computing, information privacy, electronic healthcare and others. Students learn how to conduct, write and present a systematic and academic literature review on their individually assigned topic. By doing so, students gain a fundamental understanding of the principles of empirical academic work and obtain the ability to systematically and independently address a research topic. Accordingly, the knowledge and methodological skills acquired in this seminar are a necessary foundation to write a master thesis at the chair. Besides fostering analytical thinking, this seminar will also facilitate the improvement of English skills, as the entire seminar is held in English. Thus, after the successful completion of this module, students will have improved their writing, presentation and discussion skills in English.


Inhalt der Lehrveranstaltung:

Part 1
  • Introduction to academic research principles and academic writing

Part 2

  • Examination of the topic and the research question
  • Investigation of the theoretical and methodological foundation
  • Structured analysis of the current state of research
  • Analysis and structuration of the results with regard to one specific topic in the field of information systems research

Part 3

  • Writing of the seminar thesis
  • Presentation and discussion of the results

 


Vorkenntnis für die Lehrveranstaltung:

Grundlegendes Wissen zu den Themenfeldern (bspw. durch Besuch der Vorlesungen des Lehrstuhls) ist hilfreich. 

Gute Englischkenntnisse sind notwendig, um die Literatur zu verstehen und die Präsentation sowie die Seminararbeit auszuarbeiten.

Der Besuch eines Einführungskurses der Universitätsbibliothek wird empfohlen.


Literatur zur Lehrveranstaltung:

Die Literatur wird im Rahmen des Seminars zugeteilt.

Bewerbung

Die Bewerbung erfolgt im oben angegebenen Zeitraum via Digicampus.

 

Seminarthemen

Title

1) How can the Sharing Economy contribute to a sustainable economy? Analyzing opportunities and challenges of collaborative consumption

Goal

In recent years, we have experienced the development und proliferation of business models which are based on the key ideas of sharing, exchanging and lending products as well as services. Various types ranging from car sharing through temporary renting of living space are summarized under the collective term “Sharing Economy”. Although the Sharing Economy is generally thought to hold the potential to provide a new pathway to sustainability and welfare, present media discourses show that its impact on environment, economy and society requires further research in this field.

The aim of this seminar paper is to conduct a structured literature review identifying characteristic attributes of the Sharing Economy as well as deriving specific opportunities for contributing to a sustainable economy. The work should also identify the specific challenges associated with the Sharing Economy from relevant literature streams. The paper should result in a comprehensive classification and analysis of the identified characteristics with regard to their impact on businesses on the one hand and on ecological, economic and social dimensions of sustainability on the other hand.

Readings on the Topic (T) and possible Methods (M)

T: Avital, M., Andersson, M., Nickerson, J., Sundararajan, A., Van Alstyne, M., and Verhoeven, D. 2014. “The Collaborative Economy: A Disruptive Innovation or Much Ado about Nothing?,” in Proceedings of the 35th International Conference on Information Systems (ICIS), Auckland, New Zealand.

T: Malhotra, A., and Van Alstyne, M. 2014. “The Dark Side of the Sharing Economy … and How to Lighten It,” Communications of the ACM (57:11), pp. 24–27.

M: Webster, J. and Watson, R.T. 2002. Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. 13–23.

Supervisor

Vanessa Schäffner, M.Sc

Title

2) Why do people choose to share rather than own? Analyzing participation behavior with regard to sharing services

Goal

The concept of sharing is as old as mankind, but the Sharing Economy is a relatively new phenomenon which is directly linked with the digital age. It is based on the key concept of collaborative consumption which has been facilitated by information technologies. Participation in those sharing practices can be explained by diverse motivational factors ranging from profit orientation through altruism to environmental consciousness.

The aim of this seminar paper is to conduct a structured literature review on participation behavior within the Sharing Economy. The paper should identify the existing approaches to the concept of sharing in general and analyze how participation in collaborative consumption is motivated. Furthermore, it should describe the antecedents of participation behavior of providers as well as users. The paper should conclude with an analysis of existing business models with regard to their participants’ motivations.

Readings on the Topic (T) and possible Methods (M)

T: Hellwig, K., Morhart, F., Girardin, F., and Hauser, M. 2015. ”Exploring Different Types of Sharing: A Proposed Segmentation of the Market for ‘Sharing’ Businesses,” Psychology & Marketing (32:9), pp. 891-906.

T: Hamari, J., Sjöklint, M., and Ukkonen, A. 2015. “The sharing economy: Why people participate in collaborative consumption,” Journal of the Association for Information Science and Technology (Forthcoming, 2015).

T: Matzner, M., Chasin, F., and Todenhöfer, L. 2015. “To Share or Not to Share: Towards Understanding the Antecedents of Participation in IT-Enabled Sharing Services,” ECIS 2015 Research-in-Progress Papers.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. xiii-xxiii.

Supervisor

Vanessa Schäffner, M.Sc

Title

3) How to measure actual behavior in privacy research

Goal

In privacy research, many studies rely on measuring intentions as a proxy for people’s actual behavior. However, a so called privacy paradox has been discovered: While privacy concerns are negatively correlated with people’s willingness to disclose information, their level of actual disclosure often largely exceeds the stated intentions. Thus, the question arises which types of behavior are interesting to investigate and how actual behavior can be measured.

Aim of this thesis is to provide a structured review of studies in the privacy area that have already measured actual behavior. The types of investigated behavior should be categorized and the way how behavior has been measured should be analyzed and critically discussed. Furthermore, the work should offer additional ideas on how actual behavior can be realistically measured in future privacy studies.

Readings on the Topic (T) and possible Methods (M)

T: Norberg, P. A., Horne, D. R., and Horne, D. A. 2007. “The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors,” Journal of Consumer Affairs (41:1), pp. 100–126.

T: Zimmer, J. C., Arsal, R., Al-Marzouq, M., Moore, D., and Grover, V. 2010. “Knowing Your Customers: Using a Reciprocal Relationship to Enhance Voluntary Information Disclosure,” Decision Support Systems (48:2), pp. 395–406.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. xiii-xxiii.

Supervisor

Sabrina Hauff, M.Sc.

Title

4) Why we don’t do what we intend: Examining the intention-behavior gap

Goal

Does the intention to do something lead to the according behavior? Theories like the theory of reasoned action or the theory of planned behavior suggest this relationship and are often used in IS research to argue that measuring intentions is sufficient to understand how people will behave. However, opposite evidence has also been found in some studies, e.g. in privacy or innovation research.

In this seminar thesis, academic literature has to be reviewed which has measured both, intentions and actual behavior. Aim of the thesis is to compare the two constructs to investigate their relationship in different contexts and to analyze whether an intention-behavior gap can be found.  The work should then discuss possible explanations for these findings and conclude with a research agenda proposing how to further study behavior in IS.

Readings on the Topic (T) and possible Methods (M)

T: Norberg, P. A., Horne, D. R., and Horne, D. A. 2007. “The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors,” Journal of Consumer Affairs (41:1), pp. 100–126.

T: Turner, M., Kitchenham, B., Brereton, P., Charters, S., and Budgen, D. 2010. “Does the Technology Acceptance Model Predict Actual Use? A Systematic Literature Review” Information and Software Technology (52:5), pp. 463–479.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. xiii-xxiii.

Supervisor

Sabrina Hauff, M.Sc.


Title

5) Does critical research in information systems have an ethical dimension? Analyzing the critical research approach in terms of ethics and morality

Goal

Among others, one useful way to classify research methods is to distinguish between the underlying philosophical assumptions guiding the research. They refer to e.g. questions of ‘valid’ research and appropriate research methods. In contrast to positivist and interpretive forms of research, the critical research method has attracted little attention in IS research literature. However, there is considerable evidence that critical research may be on the increase. A relevant stream of current literature proposes a strong connection between the critical approach and fundamental issues of ethics and morality.

The aim of this seminar paper is to conduct a structured literature review on critical research and connected ethical assumptions. The paper should motivate and discuss the diverse underlying research philosophies in IS research and present the differences between them. Moreover, it should describe different approaches to defining critical research and describe their main characteristics. The work should explain how concepts of ethics and morality can be linked with critical research and conclude with providing examples of how critical research based on ethical assumptions has already been applied in IS research.

Readings on the Topic (T) and possible Methods (M)

T: Orlikowski, W. J., and Baroudi, J. J., 1991. “Studying Information Technology in Organizations: Research Approaches and Assumptions,” Information Systems Research (2:1), pp. 1-28.

T:  Stahl, B. C. 2008. “The ethical nature of critical research in information systems,” Information Systems Journal (18:2), pp. 137-163.

M: Webster, J. and Watson, R.T. 2002. Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. 13–23.

Supervisor

Vanessa Schäffner, M.Sc

Title

6) Towards understanding IS in its social context: Analyzing the role of Habermas’ Theory of Communicative Action in critical IS research

Goal

Information systems have traditionally been viewed and studied from a technical perspective. Throughout upcoming streams of IS literature, the use of information systems tends to be seen as a manifestation of social actions.  Applying social and philosophical theories causes IS to appear in a new light. Following this approach, IS has to be studied as a social system. The Theory of Communicative Action (TCA) by Jürgen Habermas can be a helpful means for providing a social theory basis.

The aim of this seminar paper is to conduct a structured literature review on the TCA and its application on IS. The paper should present a theoretical foundation of the TCA as well as of the social perspective of information systems. It should continue by illustrating examples of how the TCA can be applied in order to analyze specific aspects of IS. In addition, it should develop the relevance of Habermas’ idea for IS research. The work should conclude with deriving implications from the TCA on IS and besides giving ideas on further research projects resulting from the findings.

Readings on the Topic (T) and possible Methods (M)

T: Stahl, B. C. 2008. “The ethical nature of critical research in information systems,” Information Systems Journal (18:2), pp. 137-163.

T: Lyytinen, K., and Hirschheim, R. 1988. "Information systems as rational discourse: an application of Habermas’s theory of communicative action,“ Scandinavian Journal of Management (4:1-2), pp. 19-30.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. xiii-xxiii.

Supervisor

Vanessa Schäffner, M.Sc 

Title

7) Who is intruding my privacy and why should I care? An analysis of stakeholders and their interests when an individual’s privacy is invaded

Goal

Companies such as Facebook, Google, and Amazon use personal information about their customers to improve and personalize their service offerings as this allows them to even better address customer interests and also to increase their profits. Governmental agencies say that they collect and analyze personal information to ensure the safety of their citizens. Potential employers might browse the internet to check out an applicant’s past behavior. Many people see all these types of activities as an intrusion of their privacy while others state that they have nothing to hide and thus don’t care about such activities.

Aim of this seminar paper is to provide a structured analysis on which actors can intrude an individual’s privacy, what motivates them to do so and why individuals might care about such intrusions. The work should identify the relevant literature streams and structure the results of previous studies in a comprehensive way in order to provide researchers with an understanding of the current scientific knowledge on this topic and conclude with an agenda for future research.

Readings on the Topic (T) and possible Methods (M)

T:Acquisti, A., Brandimarte, L., and Loewenstein, G. 2015. “Privacy and Human Behavior in the Age of Information” Science (347:6221), pp. 509–514.

T: Krasnova, H., Günther, O., Spiekermann, S., and Koroleva, K. 2009. “Privacy Concerns and Identity in Online Social Networks” Identity in the Information Society (2:1), pp. 39–63.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. xiii-xxiii.

Supervisor

Sabrina Hauff, M.Sc.

Title

8) How much information should I disclose? A literature review on communication privacy management theory

Goal

Communication boundary management theory (CPMT; also called information boundary theory) explains how people manage their privacy boundaries. It shows how individuals develop rules of whether to disclose personal information depending on situational and personal factors.

Goal of this seminar paper is to conduct a systematic literature review and analyze how CPMT was adapted and applied to IS literature. Moreover, potential future applications of CPMT in IS research should be discussed.

Readings on the Topic (T) and possible Methods (M)

T: Xu, H; Dinev, T.; Smith, H.J.; Hart, P. (2008): Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View. ICIS 2008.

T: Petronio, S. (1991): Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples. Communication Theory, pp. 311-335.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly (26:2), pp. xiii-xxiii.

Supervisor

Sabrina Hauff, M.Sc.




weitere Informationen zu der Lehrveranstaltung:

empfohlenes Studiensemester der Lehrveranstaltung: für alle Semester
Fachrichtung Lehrveranstaltung: Master
Dauer der Lehrveranstaltung: 4 SWS
Typ der Lehrveranstaltung: S - Seminar
Leistungspunkte: 6 ECTS
Bereich: iBWL: S&I; DFM: S&I; ReWi: Unternehmen & Mngt.; Inf. & Infw.: Wirtschaftsinformatik
Prüfung: Referat / Hausarbeit
Turnus des Prüfungsangebots: jedes SS/WS
Semester: alle WS und SS