scispace - formally typeset
Search or ask a question

Showing papers in "Journal of the Association for Information Systems in 2014"


Journal ArticleDOI
TL;DR: Research Article * Michael Barrett was the accepting senior editor and went through three revisions of this article before publication.
Abstract: Research Article * Michael Barrett was the accepting senior editor. This article was submitted on 31st March 2010 and went through three revisions. Diane M. Strong Worcester Polytechnic Institute

328 citations


Journal ArticleDOI
TL;DR: This work studied the LEGO Cuusoo crowdsourcing platform’s secret test in Japan, its widely recognized global launch, and its success in generating top-selling LEGO models, and proposes the “ambient organizational learning” framework, which accommodates both traditional, member-based organizational learning and IT-enabled, nonmember-based organizations with crowdsourcing.
Abstract: Extant organizational learning theory conceptualizes organizational learning as an internal, member-based process, sometimes supported by, yet often independent of, IT. Recently, however, several organizations have begun to involve non-members systematically in their learning by using crowdsourcing, a form of open innovation enabled by state-of-the-art IT. We examine the phenomenon of IT-enabled organizational learning with crowdsourcing in a longitudinal revelatory case study of one such organization, LEGO (2010-14). We studied the LEGO Cuusoo crowdsourcing platform’s secret test in Japan, its widely recognized global launch, and its success in generating top-selling LEGO models. Based on an analysis of how crowdsourcing contributes to the organizational learning at LEGO, we propose the “ambient organizational learning” framework. The framework accommodates both traditional, member-based organizational learning and IT-enabled, nonmember-based organizational learning with crowdsourcing.

147 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a special issue of their special issue editorial, "Special Issue Editorial 6.0.0]...,.. ].. ).
Abstract: Special Issue Editorial

141 citations


Journal ArticleDOI
TL;DR: This is the final version of the paper that describes the design and construction of the fault-side management system and some of the challenges it faced in successfully integrating it to the distributed system.
Abstract: This is the final version. Available from Association for Information Systems via the DOI in this record

137 citations


Journal ArticleDOI
TL;DR: It is demonstrated that risk-taking behavior is effectively predicted using electroencephalography (EEG) via event-related potentials (ERPs), and EEG measures significantly predict behavior in both salient and non-salient conditions, which indicates that EEG measures are a robust predictor of security behavior.
Abstract: Special Issue Anthony Vance Brigham Young University anthony@vance.name Bonnie Brinton Anderson Brigham Young University bonnie_anderson@byu.edu C. Brock Kirwan Brigham Young University kirwan@byu.edu Users’ perceptions of risks have important implications for information security because individual users’ actions can compromise entire systems. Therefore, there is a critical need to understand how users perceive and respond to information security risks. Previous research on perceptions of information security risk has chiefly relied on self-reported measures. Although these studies are valuable, risk perceptions are often associated with feelings—such as fear or doubt—that are difficult to measure accurately using survey instruments. Additionally, it is unclear how these self-reported measures map to actual security behavior. This paper contributes to this topic by demonstrating that risk-taking behavior is effectively predicted using electroencephalography (EEG) via event-related potentials (ERPs). Using the Iowa Gambling Task, a widely used technique shown to be correlated with real-world risky behaviors, we show that the differences in neural responses to positive and negative feedback strongly predict users’ information security behavior in a separate laboratory-based computing task. In addition, we compare the predictive validity of EEG measures to that of self-reported measures of information security risk perceptions. Our experiments show that self-reported measures are ineffective in predicting security behaviors under a condition in which information security is not salient. However, we show that, when security concerns become salient, self-reported measures do predict security behavior. Interestingly, EEG measures significantly predict behavior in both salient and non-salient conditions, which indicates that EEG measures are a robust predictor of security behavior.

108 citations


Journal ArticleDOI
TL;DR: This study uncovers patterns of use that reveal the roles played by task characteristics, knowledge, and the IT type in shaping enhanced use by proposing a novel and rich conceptualization of post-adoption use.
Abstract: A major problem confronting organizations is that they make large investments in information technologies (IT) that, in many cases, underperform following adoption because their features are underutilized. In information systems (IS) research, there is a need to develop a better understanding of the process by which individuals make new use of IT features. Using a grounded theory approach, we develop such an understanding by closely examining how individuals change their IT use following initial adoption. Based on analyzing interview data and expanding on extant literature to refine our results, we propose a construct called “enhanced use”, which refers to novel ways of employing IT features. We conceptualize enhanced use as having distinct forms (using a formerly unused set of available features, using an IT for additional tasks, and/or using extensions of IT features and attributes). Our analysis reveals that these forms may differ in terms of their attributes (locus of innovation, extent of extensive use, and adaptation). Our study uncovers patterns of use that reveal the roles played by task characteristics, knowledge, and the IT type in shaping enhanced use. Thus, this study heeds repeated calls to theorize about use by proposing a novel and rich conceptualization of post-adoption use.

101 citations


Journal ArticleDOI
TL;DR: The findings support the argument that successful infrastructure innovations are based on a cultivation strategy addressing specific users’ needs, usefulness, and evolutionary growth, and identify three different but interrelated types of innovation—in, of, on infrastructure—that articulate the critical role of IIs architecture in enabling successful innovation.
Abstract: In this paper, we address the question: “which conditions enable successful information infrastructure innovation?”. Information infrastructures are characterized by nonlinear evolutionary dynamics. Based on a case study that examines the design, development, and initial use of a web-based solution for patient-hospital communication at a Norwegian hospital over a ten-year period, we trace the evolution of a new II. This longitudinal analysis takes installed base cultivation as its conceptual basis. Specifically, we draw on three aspects of a cultivation strategy: growth process, user mobilization, and learning to cultivate. The analysis shows how the solution started as a bottom-up initiative of a small and motivated team at the hospital IT department, and how it grew gradually in a flexible and evolutionary way. Our findings support the argument that successful infrastructure innovations are based on a cultivation strategy addressing specific users’ needs, usefulness, and evolutionary growth. We make three key contributions to information infrastructure research. First, we expose the role architecture plays in the growth of IIs. Second, we provide insights about cultivating IIs, especially in their bootstrap phase. Third, we identify three different but interrelated types of innovation—in, of, on infrastructure—that articulate the critical role of IIs architecture in enabling successful innovation.

92 citations


Journal ArticleDOI
TL;DR: Research Article Christoph RosenKranz University of Cologne, Goethe University rosenkranz@wiso.uni-koeln.de is a post-graduate student at Cologne University and aims to use his research to improve the quality of education in Germany.
Abstract: Research Article Christoph Rosenkranz University of Cologne, Goethe University rosenkranz@wiso.uni-koeln.de

86 citations


Journal ArticleDOI
TL;DR: A four-tiered research framework is introduced, which consists of the paradigmatic or meta-theoretic assumptions that guide historical research, pragmatism as an overarching approach or a way of doing historicalResearch, the historical method as the guiding principles for producing history, and a review of some central techniques IS historians have applied in historical research.
Abstract: In this paper, we review the premises and practice of the historical method in order to understand how it can be applied to studying information systems (IS) related phenomena. We first examine the philosophical and methodological foundations of the method. For this purpose, we introduce a four-tiered research framework, which consists of (1) the paradigmatic or meta-theoretic assumptions that guide historical research, (2) pragmatism as an overarching approach or a way of doing historical research, (3) the historical method as the guiding principles for producing history, and (4) a review of some central techniques IS historians have applied in historical research. For point four, we review how McKenney et al. (1997) and Porra et al. (2005, 2006) applied Mason et al.’s (1997ab) seven steps of doing IS history. Finally, we compare the historical method with other methods applied in the IS field today: We compare the historical method with the longitudinal case study, case study, field study, and ethnography.

76 citations


Journal ArticleDOI
TL;DR: The eye-fixation related potential (EFRP) method is introduced, important IS research questions that could be pursued with the aid of EFRP are discussed, and a set of guidelines to help IS researchers use this method are described.
Abstract: This paper introduces the eye-fixation related potential (EFRP) method to IS research. The EFRP method allows one to synchronize eye tracking with electroencephalographic (EEG) recording to precisely capture users’ neural activity at the exact time at which they start to cognitively process a stimulus (e.g., event on the screen). This complements and overcomes some of the shortcomings of the traditional event related potential (ERP) method, which can only stamp the time at which a stimulus is presented to a user. Thus, we propose a method conjecture of the superiority of EFRP over ERP for capturing the cognitive processing of a stimulus when such cognitive processing is not necessarily synchronized with the time at which the stimulus appears. We illustrate the EFRP method with an experiment in a natural IS use context in which we asked users to read an industry report while email pop-up notifications arrived on their screen. The results support our proposed hypotheses and show three distinct neural processes associated with 1) the attentional reaction to email pop-up notification, 2) the cognitive processing of the email pop-up notification, and 3) the motor planning activity involved in opening or not the email. Furthermore, further analyses of the data gathered in the experiment serve to validate our method conjecture about the superiority of the EFRP method over the ERP in natural IS use contexts. In addition to the experiment, our study discusses important IS research questions that could be pursued with the aid of EFRP, and describes a set of guidelines to help IS researchers use this method.

73 citations


Journal ArticleDOI
TL;DR: While research has shown that investments in IT capability may translate into improved firm performance, how and why they do is still a source of debate.
Abstract: While research has shown that investments in IT capability may translate into improved firm performance, how and why they do is still a source of debate. Drawing on financial options thinking, rece ...

Journal ArticleDOI
TL;DR: This paper proposes grafting as a new perspective on information infrastructure (II) innovation to help explore innovation processes in settings where control is distributed and episodic and the identification of opportunities for merging an innovation with existing socio-technical arrangements.
Abstract: This paper proposes grafting as a new perspective on information infrastructure (II) innovation. We introduce the organic notion of grafting to help explore innovation processes in settings where control is distributed and episodic. Our case study follows the implementation of mobile phone-based reporting of routine data from subdistrict health facilities in Malawi. Initial grafting work entails the careful alignment of available resources, capacities, and interests through the proposition of an information system (IS) innovation (e.g., mobile phonebased reporting). The nurturing of the implementation involves collaborative efforts spanning technological, professional, geographical, and organizational boundaries. This work is taken forward by the identification of opportunities for merging an innovation with existing socio-technical arrangements (e.g., health management information systems in Malawi) in such a way that the parts continue to grow.

Journal ArticleDOI
TL;DR: In this article, the authors proposed a method to solve the problem of the problem: the one-dimensional graph. But it was shown to be ineffective, not useful, in practice.
Abstract: Research Article

Journal ArticleDOI
TL;DR: This study investigates the differing effects of two types of emoticons on the acceptance of negative feedback by considering feedback specificity as a contingent factor and suggests that using liking emoticons increases perceived good intention of the feedback provider and decreases perceived feedback negativity when the feedback is specific; however, it has no significant effect for unspecific feedback.
Abstract: Delivering negative performance feedback is inevitable in the workplace. However, recipients may feel uncomfortable and behave defensively, and may be unwilling to accept negative feedback mainly because they fear losing face. Such unproductive responses are heightened when negative feedback is delivered through computer-mediated communication (CMC) channels in which many nonverbal cues in face-to-face communication cannot be used to alleviate the concerns of losing face. This study examines the effectiveness of emoticons, which are designed as surrogates for facial expressions in CMC environments, in conveying social and emotional signals of the feedback provider. Specifically, based on the feedback process model and the dissonance reduction theory, this study investigates the differing effects of two types of emoticons (i.e., liking and disliking ones) on the acceptance of negative feedback by considering feedback specificity as a contingent factor. Our results suggest that using liking emoticons increases perceived good intention of the feedback provider and decreases perceived feedback negativity when the feedback is specific; however, it has no significant effect for unspecific feedback. By contrast, our results suggest that using disliking emoticons decreases perceived good intention of the feedback provider and increases perceived feedback negativity when the feedback is unspecific, whereas such effects are not significant for specific feedback. In turn, both perceived good intention of the feedback provider and perceived feedback negativity affect acceptance of the negative feedback.

Journal ArticleDOI
TL;DR: Interactivity and attitude toward advergames have significant positive effects on attitude toward brand, which, in turn, positively impacts purchase intention, and the results show that, in the high fit condition, both high interactivity and low expectancy lead to a more favorable attitude towardadvergames.
Abstract: Research Article Khim-Yong Goh National University of Singapore gohky@comp.nus.edu.sg Jerry Wenjie Ping National University of Singapore pingwenjie@comp.nus.edu.sg Advergames are increasingly popular for online advertising campaigns. However, few IS studies have investigated the effectiveness of this unique advertising strategy. This study sheds light on the effectiveness of advergames by studying three design factors of advergame: interactivity, fit, and expectancy. We use multiple dependent variables (e.g., attitude toward advergames, attitude toward brand, and purchase intention) to evaluate the effectiveness of advergames. Based on work from human-computer interaction research and the transportation theory, we propose two-way interaction effects of interactivity, fit, and expectancy on attitudes toward advergame, and also their main effects on attitude toward brand. A positive mediating relationship from attitude toward advergame to attitude toward brand, and to purchase intention is also hypothesized. We conducted a 2*2*2 factorial design experiment in an online 3D virtual world environment to test our hypotheses. The results show that, in the high fit condition, both high interactivity and low expectancy lead to a more favorable attitude toward advergames. However, in the low interactivity condition, low expectancy generates a more positive attitude toward advergames. Interactivity and attitude toward advergames have significant positive effects on attitude toward brand, which, in turn, positively impacts purchase intention.

Journal ArticleDOI
TL;DR: By actively participating in the design and evaluation of new socio-technical systems, IT value researchers can generate grounded theory to explain value creation in healthcare while influencing practice now.
Abstract: Today there is mixed evidence that health IT decreases costs and/or improves care quality in the US. Some of the same factors that have driven delays in realizing the benefits from IT investments in other industries (i.e., time consuming process changes) are apparent in the U.S. healthcare industry, which is only now digitizing its fundamental patient data, the electronic health record. The healthcare industry itself is in transition and new IT may not provide full benefit unless it is accompanied with a restructuring of healthcare delivery. Traditional ex post approaches to measuring IT value will limit the ability of healthcare IT value researchers to add value to practice now especially as government incentives in the US drive significant investment. But generalizing results from traditional IT value research to the healthcare setting is risky due to differences between healthcare and other industries. I advocate for action design research that uses existing theory as a foundation, but adapts it to the specific unique characteristics of this industry. By actively participating in the design and evaluation of new socio-technical systems, IT value researchers can generate grounded theory to explain value creation in healthcare while influencing practice now.


Journal ArticleDOI
TL;DR: A systematic approach to conduct quantitative multilevel IS research that is grounded in an overarching framework that focuses equally on testing variables and entities is discussed and the unique role of IS in developing multileVEL opportunities for researchers is highlighted.
Abstract: Information systems (IS) researchers often explore complex phenomena that result from the interplay between technologies and human actors; as such, IS research frequently involves constructs found at multiple levels of analysis, although rarely recognized as such. In fact, our targeted review of the IS literature found minimal explicit consideration of the issues posed by multilevel research although a number of studies implicitly conducted research at multiple levels. In this paper, we discuss the issues that result from not explicitly recognizing the multilevel nature of one’s work and offer guidance on how to identify and explicitly conduct multilevel IS research. Recognizing the relevance of multilevel research for the IS domain, we discuss a systematic approach to conduct quantitative multilevel IS research that is grounded in an overarching framework that focuses equally on testing variables and entities. We also highlight the unique role of IS in developing multilevel opportunities for researchers. Finally, we identify a number of gaps within the IS literature in which specific multilevel research questions may be articulated. Such explicit consideration of multilevel issues in future IS research will not only improve IS research but contribute to the larger discourse on multilevel research.

Journal ArticleDOI
TL;DR: This study identifies how three of the four knowledge creation modes identified by Nonaka and Takeuchi (1995) manifest through different behaviors in the IT-enabled open innovation setting compared to behaviors observed in the organizational setting.
Abstract: Open innovation is increasingly important for researchers and practitioners alike. Open innovation is closely linked to knowledge creation in that, with open innovation, knowledge inflows and outflows are exploited for innovation. In the information systems field, open innovation has been closely linked to open source software development teams. However, the literature has not yet identified how open source software development teams use information technologies to create knowledge to bring about open innovation. This study fills in this gap by asking the following research questions: RQ1) How do innovative open source software development teams create knowledge?, and RQ2) What types of information technologies do innovative open source software development teams rely on for enabling knowledge creation? I answer these research questions with a revelatory case study. The findings contribute to the knowledge management theory by identifying how three of the four knowledge creation modes identified by Nonaka and Takeuchi (1995) manifest through different behaviors in the IT-enabled open innovation setting compared to behaviors observed in the organizational setting. The findings also contribute to information systems theory by identifying the role of information technologies in enabling knowledge creation for open innovation. This study further provides researchers and practitioners with ways of identifying knowledge creation by analyzing information technology artifacts, such as mailing lists, issue trackers, and software versioning tools.

Journal ArticleDOI
TL;DR: General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights.
Abstract: General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edinburgh Research Explorer content complies with UK legislation. If you believe that the public display of this file breaches copyright please contact openaccess@ed.ac.uk providing details, and we will remove access to the work immediately and investigate your claim.

Journal ArticleDOI
TL;DR: In this article, the authors present a special issue of their book, this article : "The Future of Health.special issues.special issue.1]... ].
Abstract: Special Issue

Journal ArticleDOI
TL;DR: An editorial note highlights some of the obstacles that theory testing researchers face, and assists authors so that their papers will not be rejected outright on submission, nor slowed unnecessarily in the review process.
Abstract: Theory testing work is popular in information systems (IS), with many studies using questionnaires, experiments, or other methods to gather quantitative data and test hypotheses with statistical techniques. This editorial note highlights some of the obstacles that theory testing researchers face, and assists authors so that their papers will not be rejected outright on submission, nor slowed unnecessarily in the review process. In particular, we identify three obstacles relating to theorizing and five related to methods. We provide guidance on how authors can deal with each obstacle, and include examples of studies that have successfully addressed the obstacle. We hope that our editorial will encourage authors to take better note of these obstacles and to give further consideration to avoiding them when they plan and conduct their research studies.

Journal ArticleDOI
TL;DR: The notion of generification is extended to the formative stages of generic systems and insight is provided about the key mechanisms at play in this crucial phase of the design phase of these systems.
Abstract: The implementation of large generic systems in organizations is associated with many benefits. Some of these are institutional-wide coverage, streamlining of work practices, and the possibility to reuse systems across many institutional settings. However, many studies have noted how organizations are different and therefore may have diverging needs (e.g., Berg, 1999; Berg & Goorman, 1999; Star & Ruhleder, 1996). Accordingly, it is crucial for an organization’s vendors and project managers to align local needs with technical opportunities in order to establish a well-working system. Pollock and Williams (2008) have coined this process “generification”, and describe it as the vendors’ strategy of making a generic system work in several settings. Together with customization capabilities of the software, generification involves social processes of ordering, prioritizing, and persuading users in order to motivate them to use similar versions of the same system that is installed in different organizations (Pollock & Williams, 2008) Currently, the mechanisms of generification during implementation and use are well known (see, e.g., Pollock & Williams, 2008), but we have less insight about the generification processes in the design phase and to what extent local knowledge is exploited in the process. Therefore, this paper extends the notion of generification to the formative stages of generic systems and provides insight about the key mechanisms at play in this crucial phase.

Journal ArticleDOI
TL;DR: This study examines the development of social capital in the collaboration network of information systems (IS) scholars over a 33-year period and offers some recommendations as to how the IS community can increase the field's social capital, and thereby facilitate knowledge creation and innovation.
Abstract: Research Perspective This study examines the development of social capital in the collaboration network of information systems (IS) scholars over a 33-year period Systems Journal), we analyze the historical trajectory of five aspects of the field's structural social capital: network ties, network configuration, structural holes, growth, and structural cohesion. Our results show that, as a scientific field, the IS community has made significant progress in accumulating social capital. The current IS collaboration network is also comparable in several aspects with networks found in other business disciplines (e.g., management, finance, and marketing). Our study has several important implications for the focus-versus-diversity debate in the IS field. Based on our findings, we offer some recommendations as to how the IS community can increase the field's social capital, and thereby facilitate knowledge creation and innovation.

Journal ArticleDOI
TL;DR: An evolutionary-historical analysis is applied to the emergence of humans’ major information processing capabilities to trace the development of information systems to establish the three propositions and advance a case that these propositions are potentially a sufficient conceptual foundation for IS research.
Abstract: I apply an evolutionary-historical analysis, a variation of historical analysis, to the emergence of humans’ major information processing capabilities to trace the development of information systems to establish the propositions. I identify some research questions directly arising from the three propositions and advance a case that these propositions are potentially a sufficient conceptual foundation for IS research.

Journal ArticleDOI
TL;DR: The concept of open innovation advocates that in today’s increasingly boundary free world, organizations should seek to exploit inflows and outflows of knowledge to accelerate internal innovation, and expand the markets for external use of innovation.
Abstract: The concept of open innovation advocates that in today’s increasingly boundary free world, organizations should seek to exploit inflows and outflows of knowledge to accelerate internal innovation, and expand the markets for external use of innovation (Chesbrough 2003). This open model of innovation challenges the traditional closed view, where invention and design is restricted to internal resources. Indeed, the past decade has witnessed a flurry of experimentation with different styles of open innovation in industries as diverse as consumer goods, semi-conductors, automotive engineering, and software engineering. IS has played a prominent role in creating the necessity for, and the implementation of, open innovation models. For example, the convergence of cheap personal computers, fiber optic cable, and powerful workflow software has been attributed to the “flattening” of the planet and the rise in global collaboration (Friedman 2006). Major corporations like IBM, GE, Boeing, and Proctor & Gamble have integrated online crowdsourcing platforms as part of their open innovation programs. Likewise, the open source software movement is also often viewed as a role model for open innovation.


Journal ArticleDOI
TL;DR: It is argued that an evaluation based on SC and one based on CR are significantly different in how they use knowledge gained in the field, and in the kind of evidence and recommendations that they can offer policy makers.
Abstract: This paper analyzes how researchers’ different ontological and epistemological assumptions shape the process and outcomes of evaluation research. Focusing on the critical realism (CR) and social constructionism (SC) philosophical approaches, it outlines the rationale for multi-ontological evaluation and develops principles for conducting it. The paper draws from experience of evaluating a national implementation program of electronic health records in hospitals, one of the projects of the English National Programme for IT. It argues that an evaluation based on SC and one based on CR are significantly different in how they use knowledge gained in the field, and in the kind of evidence and recommendations that they can offer policy makers. The CR philosophy applied to evaluation research provides foundations from which judgments and abstractions can be presented in the form expected by the policy makers and managers who commission evaluations. In line with its ontological standing, social constructionism cannot simply or directly abstract and generalize across contexts, though it can offer other types of valuable evaluative insight. We show that, despite their differences, these two philosophical positions can, when taken together, produce jointly useful knowledge. This paper argues for the use of multi-ontological evaluation approaches and provides guidelines for undertaking such endeavors by emphasizing the need for mutual respect, dialogue, negotiation, and reflection.


Journal ArticleDOI
TL;DR: An in-depth view of what IT-enabled open innovation means in the context of the newspaper industry is presented, showing that the process of legitimization inscribed by a particularly charged information technology—the printing press—continues to exert great influence in what constitutes open practice in the newspaper Industry.
Abstract: Organizational practices that foster a dialogic relationship between organizations and their constituent customers have created an arena for inbound and outbound innovation. At the nexus of this development occurring in the media industries, these flows are carried by various forms of digital, social media and an increasing digital presence in the form of dynamic websites with varying degrees of interactive capabilities. In this paper, we posit that the newspaper industry is torn between indifference and cautious apprehension caused by the difficulty in marrying the journalism profession’s carefully guarded gatekeeping practices with the revolving doors of open innovation. Gatekeeping has emerged as a fiercely defended cornerstone for the industry and the profession of journalism itself is not enough to distinguish amateurs from professionals; for the segregation between professionals and amateurs to carry weight rather than being reduced to a hollow title, the segregation needs a practice that explicitly enforces gatekeeping—where actions speak louder than titles. Against this backdrop, we pursue the following research question: Why has IT-enabled open innovation become such a contentious issue in the context of the newspaper industry? Combining contextual in-situ ethnographic interviews and observation with an industry-wide content analysis of Swedish newspaper websites, we present an in-depth view of what IT-enabled open innovation means in the context of the newspaper industry. Results show that the process of legitimization inscribed by a particularly charged information technology—the printing press—continues to exert great influence in what constitutes open practice in the newspaper industry.