{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:47:14Z","timestamp":1743043634706,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031153419"},{"type":"electronic","value":"9783031153426"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15342-6_20","type":"book-chapter","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T23:02:35Z","timestamp":1662418955000},"page":"254-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Clustering Design Science Research Based on the Nature of the Designed Artifact"],"prefix":"10.1007","author":[{"given":"Joakim","family":"Laine","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1499-5427","authenticated-orcid":false,"given":"Markus Philipp","family":"Zimmer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6406-8093","authenticated-orcid":false,"given":"Matti","family":"Minkkinen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8302-1397","authenticated-orcid":false,"given":"Hannu","family":"Salmela","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1981-566X","authenticated-orcid":false,"given":"Matti","family":"M\u00e4ntym\u00e4ki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"issue":"2","key":"20_CR1","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1287\/isre.2020.0973","volume":"32","author":"A Abbasi","year":"2021","unstructured":"Abbasi, A., Dobolyi, D., Vance, A., Zahedi, F.M.: The phishing funnel model: a design artifact to predict user susceptibility to phishing websites. Inf. Syst. Res. 32(2), 410\u2013436 (2021). https:\/\/doi.org\/10.1287\/isre.2020.0973","journal-title":"Inf. Syst. Res."},{"key":"20_CR2","doi-asserted-by":"publisher","unstructured":"Abbasi, A., Zhou, Y., Deng, S., Zhang, P.: Text analytics to support sense-making in social media: a language-action perspective. MIS Q. 42(2), 427\u2013464 (2018). https:\/\/doi.org\/10.25300\/MISQ\/2018\/13239","DOI":"10.25300\/MISQ\/2018\/13239"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Akhlaghpour, S., Lapointe, L.: From placebo to panacea: studying the diffusion of IT management techniques with ambiguous efficiencies: the case of capability maturity model. J. Assoc. Inf. Syst. 19(06), 441\u2013502 (2018). https:\/\/doi.org\/10.17705\/1jais.00498","DOI":"10.17705\/1jais.00498"},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"Baird, A., Maruping, L.M.: The next generation of research on IS use: a theoretical framework of delegation to and from agentic IS artifacts. MIS Q. 45(1), 315\u2013341 (2021). https:\/\/doi.org\/10.25300\/MISQ\/2021\/15882","DOI":"10.25300\/MISQ\/2021\/15882"},{"issue":"1","key":"20_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1287\/isre.2017.0718","volume":"29","author":"A Barua","year":"2018","unstructured":"Barua, A., Mani, D.: Reexamining the market value of information technology events. Inf. Syst. Res. 29(1), 225\u2013240 (2018). https:\/\/doi.org\/10.1287\/isre.2017.0718","journal-title":"Inf. Syst. Res."},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Baskerville, R., Baiyere, A., Gergor, S., Hevner, A., Rossi, M.: Design science research contributions: finding a balance between artifact and theory. J. Assoc. Inf. Syst. 19(5), 358\u2013376 (2018). https:\/\/doi.org\/10.17705\/1jais.00495","DOI":"10.17705\/1jais.00495"},{"issue":"2","key":"20_CR7","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1287\/isre.2019.0841","volume":"30","author":"L Bouayad","year":"2019","unstructured":"Bouayad, L., Padmanabhan, B., Chari, K.: Audit policies under the sentinel effect: deterrence-driven algorithms. Inf. Syst. Res. 30(2), 466\u2013485 (2019). https:\/\/doi.org\/10.1287\/isre.2019.0841","journal-title":"Inf. Syst. Res."},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Gregor, S., Kruse, L.C., Seidel, S.: The anatomy of a design principle. J. Assoc. Inf. Syst. (2020). https:\/\/doi.org\/10.17705\/1jais.00129","DOI":"10.17705\/1jais.00129"},{"key":"20_CR9","doi-asserted-by":"publisher","unstructured":"Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337\u2013355 (2013). https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.2.01","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"20_CR10","doi-asserted-by":"publisher","unstructured":"Gregor, S., Jones, D.: The anatomy of a design theory. J. Assoc. Inf. Syst. 8(5), 312\u2013335 (2007). https:\/\/doi.org\/10.17705\/1jais.00129","DOI":"10.17705\/1jais.00129"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Haki, K., Beese, J., Aier, S., Winter, R.: The evolution of information systems architecture: an agent-based simulation model. MIS Q. 44(1), 155\u2013184 (2020). https:\/\/doi.org\/10.25300\/MISQ\/2020\/14494","DOI":"10.25300\/MISQ\/2020\/14494"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75\u2013106 (2004)","journal-title":"MIS Q."},{"issue":"3","key":"20_CR13","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1287\/isre.2017.0694","volume":"28","author":"Y-C Ho","year":"2017","unstructured":"Ho, Y.-C., Wu, J., Tan, Y.: Disconfirmation effect on online rating behavior: a structural model. Inf. Syst. Res. 28(3), 626\u2013642 (2017). https:\/\/doi.org\/10.1287\/isre.2017.0694","journal-title":"Inf. Syst. Res."},{"key":"20_CR14","doi-asserted-by":"publisher","unstructured":"Iivari, J.: Editorial: a critical look at theories in design science research. J. Assoc. Inf. Syst. 21(3), 502\u2013519 (2020). https:\/\/doi.org\/10.17705\/1jais.00610","DOI":"10.17705\/1jais.00610"},{"issue":"5","key":"20_CR15","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1057\/ejis.2008.40","volume":"17","author":"B Kuechler","year":"2008","unstructured":"Kuechler, B., Vaishnavi, V.: On theory development in design science research: anatomy of a research project. Eur. J. Inf. Syst. 17(5), 489\u2013504 (2008). https:\/\/doi.org\/10.1057\/ejis.2008.40","journal-title":"Eur. J. Inf. Syst."},{"issue":"2","key":"20_CR16","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1080\/07421222.2018.1451953","volume":"35","author":"C Lehrer","year":"2018","unstructured":"Lehrer, C., Wieneke, A., vom Brocke, J., Jung, R., Seidel, S.: How big data analytics enables service innovation: materiality, affordance, and the individualization of service. J. Manag. Inf. Syst. 35(2), 424\u2013460 (2018). https:\/\/doi.org\/10.1080\/07421222.2018.1451953","journal-title":"J. Manag. Inf. Syst."},{"key":"20_CR17","doi-asserted-by":"publisher","unstructured":"Li, Y., Xie, Y., Zeng, Z.: Modeling multichannel advertising attribution across competitors. MIS Q. 43(1), 287\u2013312 (2019). https:\/\/doi.org\/10.25300\/MISQ\/2019\/14257","DOI":"10.25300\/MISQ\/2019\/14257"},{"key":"20_CR18","doi-asserted-by":"publisher","unstructured":"Lin, Y.-K., Chen, H., Brown, R. A., Li, S.-H., Yang, H.-J.: Healthcare predictive analytics for risk profiling in chronic care: a Bayesian multitask learning approach. MIS Q. 41(2), 473\u2013495 (2017). https:\/\/doi.org\/10.25300\/MISQ\/2017\/41.2.07","DOI":"10.25300\/MISQ\/2017\/41.2.07"},{"key":"20_CR19","doi-asserted-by":"publisher","unstructured":"Maedche, A., Gregor, S., Parsons, J.: Mapping design contributions in information systems research: the design research activity framework. Commun. Assoc. Inf. Syst. 49(1), 355\u2013378 (2021). https:\/\/doi.org\/10.17705\/1CAIS.04914","DOI":"10.17705\/1CAIS.04914"},{"issue":"4","key":"20_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March, S.T., Smith, G.F.: Design and natural science research on information technology. Decis. Support Syst. 15(4), 251\u2013266 (1995). https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2","journal-title":"Decis. Support Syst."},{"issue":"1","key":"20_CR21","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1080\/07421222.2018.1550555","volume":"36","author":"LM Maruping","year":"2019","unstructured":"Maruping, L.M., Venkatesh, V., Thong, J.Y.L., Zhang, X.: A risk mitigation framework for information technology projects: a cultural contingency perspective. J. Manag. Inf. Syst. 36(1), 120\u2013157 (2019). https:\/\/doi.org\/10.1080\/07421222.2018.1550555","journal-title":"J. Manag. Inf. Syst."},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Miah, S.J., Gammack, J.G., McKay, J.: A Metadesign theory for tailorable decision support. J. Assoc. Inf. Syst. 570\u2013603 (2019). https:\/\/doi.org\/10.17705\/1jais.00544","DOI":"10.17705\/1jais.00544"},{"key":"20_CR23","doi-asserted-by":"publisher","unstructured":"Mingers, J., Standing, C.: A framework for validating information systems research based on a pluralist account of truth and correctness. J. Assoc. Inf. Syst. 117\u2013151 (2020). https:\/\/doi.org\/10.17705\/1jais.00594","DOI":"10.17705\/1jais.00594"},{"issue":"3","key":"20_CR24","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45\u201377 (2007). https:\/\/doi.org\/10.2753\/MIS0742-1222240302","journal-title":"J. Manag. Inf. Syst."},{"issue":"4","key":"20_CR25","doi-asserted-by":"publisher","first-page":"994","DOI":"10.1080\/07421222.2017.1394044","volume":"34","author":"J-H Piel","year":"2017","unstructured":"Piel, J.-H., Hamann, J.F.H., Koukal, A., Breitner, M.H.: Promoting the system integration of renewable energies: toward a decision support system for incentivizing spatially diversified deployment. J. Manag. Inf. Syst. 34(4), 994\u20131022 (2017). https:\/\/doi.org\/10.1080\/07421222.2017.1394044","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"20_CR26","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/07421222.2019.1705512","volume":"37","author":"M Silic","year":"2020","unstructured":"Silic, M., Lowry, P.B.: Using design-science based gamification to improve organizational security training and compliance. J. Manag. Inf. Syst. 37(1), 129\u2013161 (2020). https:\/\/doi.org\/10.1080\/07421222.2019.1705512","journal-title":"J. Manag. Inf. Syst."},{"key":"20_CR27","doi-asserted-by":"publisher","unstructured":"Velichety, S, Ram, S.: Finding a needle in the haystack: recommending online communities on social media platforms using network and design science. J. Assoc. Inf. Syst. 22(5), 1285\u20131310 (2020). https:\/\/doi.org\/10.17705\/1jais.00694","DOI":"10.17705\/1jais.00694"},{"key":"20_CR28","doi-asserted-by":"publisher","unstructured":"Wu, Y., Choi, B., Guo, X., Chang, K.: Understanding user adaptation toward a new IT system in organizations: a social network perspective. J. Assoc. Inf. Syst. 18(11), 787\u2013813 (2017). https:\/\/doi.org\/10.17705\/1jais.00473","DOI":"10.17705\/1jais.00473"},{"issue":"1","key":"20_CR29","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1080\/07421222.2021.1870388","volume":"38","author":"J Xie","year":"2021","unstructured":"Xie, J., Zhang, Z., Liu, X., Zeng, D.: Unveiling the hidden truth of drug addiction: a social media approach using similarity network-based deep learning. J. Manag. Inf. Syst. 38(1), 166\u2013195 (2021). https:\/\/doi.org\/10.1080\/07421222.2021.1870388","journal-title":"J. Manag. Inf. Syst."},{"issue":"3","key":"20_CR30","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1287\/isre.2020.0924","volume":"31","author":"X Ye","year":"2020","unstructured":"Ye, X., Peng, X., Wang, X., Teo, H.-H.: Developing and testing a theoretical path model of web page impression formation and its consequence. Inf. Syst. Res. 31(3), 929\u2013949 (2020). https:\/\/doi.org\/10.1287\/isre.2020.0924","journal-title":"Inf. Syst. Res."}],"container-title":["Lecture Notes in Computer Science","The Role of Digital Technologies in Shaping the Post-Pandemic World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15342-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T14:20:17Z","timestamp":1710339617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15342-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031153419","9783031153426"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15342-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newcastle upon Tyne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/i3e2022.com\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}