{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T03:10:46Z","timestamp":1773112246170,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T00:00:00Z","timestamp":1737849600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T00:00:00Z","timestamp":1737849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005711","name":"Universit\u00e4t Hamburg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005711","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2026,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The relationship between information technology (IT) and society is marked by a dual normativity, where societal norms and values shape IT development and deployment, while the use of novel technologies in turn influences and potentially transforms societal norms, values, and practices. With a distinctive and evolving understanding of IT, the information systems (IS) field has the potential not only to address legal compliance but to support value judgment issues and to promote a productive and informed discourse. This research note describes how researchers from IS, law, and ethics collaborated while enhancing each discipline individually and the discipline intersections. In doing so, the authors specify an interdisciplinary, boundary-spanning framework that can help other researchers to foster research at these disciplinary intersections. This approach involves a reciprocal process around boundary objects in form of phenomena, concepts, and values. Additionally, this research note offers further recommendations to mitigate the diverse challenges that can arise in interdisciplinary research.<\/jats:p>","DOI":"10.1007\/s12599-024-00920-4","type":"journal-article","created":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T11:58:01Z","timestamp":1737892681000},"page":"185-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Interdisciplinary Boundary Spanning \u2013 Guidance for Collaboration Between the Disciplines of Information Systems, Law, and Ethics"],"prefix":"10.1007","volume":"68","author":[{"given":"Christian","family":"Kurtz","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Burmeister","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Wittner","sequence":"additional","affiliation":[]},{"given":"Mattis","family":"Jacobs","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Semmann","sequence":"additional","affiliation":[]},{"given":"Judith","family":"Simon","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Schulz","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Schirmer","sequence":"additional","affiliation":[]},{"given":"Tilo","family":"B\u00f6hmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,26]]},"reference":[{"key":"920_CR1","volume-title":"Chaos of disciplines","author":"A Abbott","year":"2010","unstructured":"Abbott A (2010) Chaos of disciplines. University of Chicago Press"},{"issue":"1","key":"920_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0960085X.2020.1721947","volume":"29","author":"PJ \u00c5gerfalk","year":"2020","unstructured":"\u00c5gerfalk PJ (2020) Artificial intelligence as digital agency. Eur J Inf Syst 29(1):1\u20138","journal-title":"Eur J Inf Syst"},{"key":"920_CR50","doi-asserted-by":"crossref","unstructured":"Aier S, Labusch, N, P\u00e4hler P (2015) Implementing architectural thinking: a case study at Commerzbank AG. Advanced Information Systems Engineering Workshops: CAiSE 2015 International Workshops, Stockholm, Sweden, June 8\u20139, 2015, Proceedings 27: 389\u2013400. Springer International Publishing","DOI":"10.1007\/978-3-319-19243-7_36"},{"issue":"1","key":"920_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/4132338","volume":"26","author":"RL Baskerville","year":"2002","unstructured":"Baskerville RL, Myers MD (2002) Information systems as a reference discipline. MIS Q 26(1):1\u201314","journal-title":"MIS Q"},{"issue":"4","key":"920_CR4","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1287\/isre.7.4.389","volume":"7","author":"I Benbasat","year":"1996","unstructured":"Benbasat I, Weber R (1996) Research commentary: rethinking \u201cdiversity\u201d in information systems research. Inf Syst Res 7(4):389\u2013399","journal-title":"Inf Syst Res"},{"issue":"4","key":"920_CR5","doi-asserted-by":"publisher","first-page":"206","DOI":"10.17705\/1thci.00136","volume":"12","author":"I Benke","year":"2020","unstructured":"Benke I, Feine J, Venable JR, Maedche A (2020) On implementing ethical principles in design science research. AIS Trans Human-Comput Interaction 12(4):206\u2013227","journal-title":"AIS Trans Human-Comput Interaction"},{"issue":"1","key":"920_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1057\/jit.2013.5","volume":"28","author":"EW Bernroider","year":"2013","unstructured":"Bernroider EW, PilkingtonA CJR (2013) Research in information systems: A study of diversity and inter-disciplinary discourse in the AIS basket journals between 1995 and 2011. J Inf Technol 28(1):74\u201389","journal-title":"J Inf Technol"},{"key":"920_CR7","volume-title":"The Cambridge handbook of information and computer ethics","author":"P Brey","year":"2010","unstructured":"Brey P (2010) Values in technology and disclosive computer ethics. In: Floridi Luciano (ed) The Cambridge handbook of information and computer ethics. Cambridge University Press, Cambridge"},{"key":"920_CR8","unstructured":"Burmeister F, Kurtz C, Drews P, Schirmer I (2021) Unraveling privacy concerns in complex data ecosystems with architectural thinking. In: Proceedings of the 42nd International Conference on Information Systems, Austin"},{"key":"920_CR9","unstructured":"Burmeister F, Kurtz C, Sp\u00fcrkel J, Mast T, Schirmer I, B\u00f6hmann T (2024) Interdisciplinary architecture modeling for regulating digital business ecosystems. In: Proceedings of the Pacific Asia Conference on Information Systems, Ho Chi Minh City"},{"issue":"4","key":"920_CR10","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1287\/orsc.13.4.442.2953","volume":"13","author":"PR Carlile","year":"2002","unstructured":"Carlile PR (2002) A pragmatic view of knowledge and boundaries: Boundary objects in new product development. Organ Sci 13(4):442\u2013455","journal-title":"Organ Sci"},{"issue":"6","key":"920_CR11","doi-asserted-by":"publisher","first-page":"224","DOI":"10.25011\/cim.v30i6.2950","volume":"30","author":"BC Choi","year":"2007","unstructured":"Choi BC, Pak AW (2007) Multidisciplinarity, interdisciplinarity, and transdisciplinarity in health research, services, education and policy: 2. Promotors, barriers, and strategies of enhancement. Clin Investig Med 30(6):224\u2013232","journal-title":"Clin Investig Med"},{"issue":"4","key":"920_CR12","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1080\/0960085X.2023.2174050","volume":"33","author":"E Dickhaut","year":"2023","unstructured":"Dickhaut E, Janson A, S\u00f6llner M, Leimeister JM (2023) Lawfulness by design\u2014development and evaluation of lawful design patterns to consider legal requirements. Eur J Inf Syst 33(4):441\u2013468","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"920_CR13","doi-asserted-by":"publisher","first-page":"217","DOI":"10.25300\/MISQ\/2015\/39.1.10","volume":"39","author":"B Eaton","year":"2015","unstructured":"Eaton B, Elaluf-Calderwood S, Sorensen C, Yoo Y (2015) Distributed tuning of boundary resources: the case of Apple\u2019s iOS service system. MIS Q 39(1):217\u2013243","journal-title":"MIS Q"},{"issue":"19","key":"920_CR14","doi-asserted-by":"publisher","first-page":"5357","DOI":"10.3390\/su11195357","volume":"11","author":"B Feldhoff","year":"2019","unstructured":"Feldhoff B, Stockmann N, Fanderl N, Gahle A-K, Graf A, Leger M, Sonnberger M (2019) Bridging theories and practices: boundary objects and constellation analysis as vehicles for interdisciplinary knowledge integration. Sustainability 11(19):5357","journal-title":"Sustainability"},{"key":"920_CR15","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001","volume-title":"Value sensitive design: shaping technology with moral imagination","author":"B Friedman","year":"2019","unstructured":"Friedman B, Hendry DG (2019) Value sensitive design: shaping technology with moral imagination. MIT Press"},{"key":"920_CR16","volume-title":"The Handbook of Information and Computer Ethics","author":"B Friedman","year":"2008","unstructured":"Friedman B, Kahn PH, Borning A (2008) Value sensitive design and information systems. In: Himma KE, Tavani HT (eds) The Handbook of Information and Computer Ethics. Wiley"},{"key":"920_CR17","volume-title":"Early engagement and new technologies: Opening up the laboratory","author":"B Friedman","year":"2013","unstructured":"Friedman B, Kahn PH, Borning A, Huldtgren A (2013) Value sensitive design and information systems. In: Neelke D, Daan S, van de Ibo P, Michael EG (eds) Early engagement and new technologies: Opening up the laboratory. Springer"},{"key":"920_CR18","unstructured":"Gebken L, Kurtz C, Drews P, Schirmer I, B\u00f6hmann T (2021) Human-value-oriented digital social innovation: a multilevel design framework. In: Proceedings of the 42nd International Conference on Information Systems, Austin"},{"issue":"2","key":"920_CR19","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1111\/j.1365-2575.2012.00406.x","volume":"23","author":"A Ghazawneh","year":"2013","unstructured":"Ghazawneh A, Henfridsson O (2013) Balancing platform control and external contribution in third-party development: the boundary resources model. Inf Syst J 23(2):173\u2013192","journal-title":"Inf Syst J"},{"issue":"4","key":"920_CR20","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1177\/1367549410377152","volume":"13","author":"M Haugaard","year":"2010","unstructured":"Haugaard M (2010) Power: a \u2018family resemblance\u2019concept. Eur J Cult Stud 13(4):419\u2013438","journal-title":"Eur J Cult Stud"},{"key":"920_CR21","volume-title":"The Oxford handbook of interdisciplinarity","author":"K Huutoniemi","year":"2010","unstructured":"Huutoniemi K (2010) Evaluating interdisciplinary research. In: Frodeman R, Klen JT, Mitcham C (eds) The Oxford handbook of interdisciplinarity. Oxford University Press"},{"key":"920_CR22","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1146\/annurev-soc-070308-115954","volume":"35","author":"JA Jacobs","year":"2009","unstructured":"Jacobs JA, Frickel S (2009) Interdisciplinarity: a critical assessment. Ann Rev Sociol 35:43\u201365","journal-title":"Ann Rev Sociol"},{"issue":"3","key":"920_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14763\/2021.3.1580","volume":"10","author":"M Jacobs","year":"2021","unstructured":"Jacobs M, Kurtz C, Simon J, B\u00f6hmann T (2021) Value-sensitive design and power in socio-technical ecosystems. Internet Policy Rev 10(3):1\u201326","journal-title":"Internet Policy Rev"},{"issue":"2","key":"920_CR24","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1287\/isre.2018.0786","volume":"29","author":"K Karhu","year":"2018","unstructured":"Karhu K, Gustafsson R, Lyytinen K (2018) Exploiting and defending open digital platforms with boundary resources: android\u2019s five platform forks. Inf Syst Res 29(2):479\u2013497","journal-title":"Inf Syst Res"},{"issue":"36","key":"920_CR25","first-page":"711","volume":"34","author":"R Knackstedt","year":"2014","unstructured":"Knackstedt R, Braeuer S, Heddier M, Becker J (2014) Integrating regulatory requirements into information systems design and implementation. Commun Assoc Inf Syst 34(36):711\u2013736","journal-title":"Commun Assoc Inf Syst"},{"key":"920_CR26","unstructured":"Kurtz C, Wittner F, Vogel P, Semmann M, B\u00f6hmann T (2020) Design goals for consent at scale in digital service ecosystems. In: Proceedings of the 28th European Conference on Information Systems, AIS Virtual Conference"},{"key":"920_CR27","doi-asserted-by":"crossref","unstructured":"Kurtz C, Wittner F, Semmann M, Schulz W, B\u00f6hmann T (2021) Accountability of platform providers for unlawful personal data processing in their ecosystems\u2014a socio-techno-legal analysis of Facebook and Apple\u2019s iOS according to GDPR. J Responsib Technol 9","DOI":"10.1016\/j.jrt.2021.100018"},{"issue":"1","key":"920_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1177\/02683962221141456","volume":"38","author":"C Labadie","year":"2023","unstructured":"Labadie C, Legner C (2023) Building data management capabilities to address data protection regulations: learnings from EU-GDPR. J Inf Technol 38(1):16\u201344","journal-title":"J Inf Technol"},{"key":"920_CR29","volume-title":"Code","author":"L Lessig","year":"2006","unstructured":"Lessig L (2006) Code. Basic Books"},{"issue":"4","key":"920_CR30","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1002\/sres.2564","volume":"36","author":"LF Luna-Reyes","year":"2019","unstructured":"Luna-Reyes LF, Black LJ, Ran W, Andersen DL, Jarman H, Richardson GP, Andersen DF (2019) Modeling and simulation as boundary objects to facilitate interdisciplinary research. Syst Res Behav Sci 36(4):494\u2013513","journal-title":"Syst Res Behav Sci"},{"issue":"6","key":"920_CR31","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1016\/j.clsr.2017.05.020","volume":"33","author":"DL M\u00e9tayer","year":"2017","unstructured":"M\u00e9tayer DL, Bossuet M, Coudert F, Gayrel C, Jaime F, Jouvray C, Kung A, Ma Z, Ma\u00f1a A (2017) Interdisciplinarity in practice: challenges and benefits for privacy research. Comput Law Secur Rev 33(6):864\u2013869","journal-title":"Comput Law Secur Rev"},{"issue":"1","key":"920_CR32","first-page":"38","volume":"50","author":"M Mirbabaie","year":"2022","unstructured":"Mirbabaie M, Brendel AB, Hofeditz L (2022) Ethics and AI in information systems research. Commun Assoc Inf Syst 50(1):38","journal-title":"Commun Assoc Inf Syst"},{"key":"920_CR33","unstructured":"Mueller M, Heger O (2018) Health at any cost? Investigating ethical dimensions and potential conflicts of an ambulatory therapeutic assistance system through value sensitive design. In: Proceedings of the International Conference on Information Systems, San Fransisco"},{"issue":"6","key":"920_CR34","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/j.im.2014.01.002","volume":"51","author":"MD Myers","year":"2014","unstructured":"Myers MD, Venable JR (2014) A set of ethical principles for design science research in information systems. Inf Manag 51(6):801\u2013809","journal-title":"Inf Manag"},{"key":"920_CR35","first-page":"687","volume":"31","author":"K Nissim","year":"2017","unstructured":"Nissim K, Bembenek A, Wood A, Bun M, Gaboardi M, Gasser U, O\u2019Brien DR, Steinke T, Vadhan S (2017) Bridging the gap between computer science and legal approaches to privacy. Harv J Law Technol 31:687","journal-title":"Harv J Law Technol"},{"key":"920_CR36","unstructured":"Perrigo B (2023) Exclusive: OpenAI lobbied the E.U. to water down AI regulation. In: Time. https:\/\/time.com\/6288245\/openai-eu-lobbying-ai-act\/. Accessed 28 Jun 2023"},{"key":"920_CR37","first-page":"553","volume":"76","author":"JR Reidenberg","year":"1997","unstructured":"Reidenberg JR (1997) Lex informatica: The formulation of information policy rules through technology. Texas Law Rev 76:553","journal-title":"Texas Law Rev"},{"issue":"4","key":"920_CR38","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1287\/isre.7.4.400","volume":"7","author":"D Robey","year":"1996","unstructured":"Robey D (1996) Research commentary: diversity in information systems research: threat, promise, and responsibility. Inf Syst Res 7(4):400\u2013408","journal-title":"Inf Syst Res"},{"key":"920_CR39","volume-title":"Power and technology: A philosophical and ethical analysis","author":"F Sattarov","year":"2019","unstructured":"Sattarov F (2019) Power and technology: A philosophical and ethical analysis. Rowman & Littlefield"},{"key":"920_CR40","volume-title":"Handbuch Medien-und Informationsethik","author":"J Simon","year":"2016","unstructured":"Simon J (2016) Values in design. In: Heesen J (ed) Handbuch Medien-und Informationsethik. Springer"},{"key":"920_CR41","volume-title":"The ethics of technology: Methods and approaches","author":"J Simon","year":"2017","unstructured":"Simon J (2017) Value-sensitive design and responsible research and innovation. In: Hansson SO (ed) The ethics of technology: Methods and approaches. Rowman & Littlefield"},{"issue":"5","key":"920_CR42","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1177\/0162243910377624","volume":"35","author":"SL Star","year":"2010","unstructured":"Star SL (2010) This is not a boundary object: Reflections on the origin of a concept. Sci Technol Hum Values 35(5):601\u2013617","journal-title":"Sci Technol Hum Values"},{"issue":"3","key":"920_CR43","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1177\/030631289019003001","volume":"19","author":"SL Star","year":"1989","unstructured":"Star SL, Griesemer JR (1989) Institutional ecology, translations\u2019 and boundary objects: amateurs and professionals in Berkeley\u2019s Museum of Vertebrate Zoology, 1907\u201339. Soc Stud Sci 19(3):387\u2013420","journal-title":"Soc Stud Sci"},{"key":"920_CR44","volume-title":"Interdisciplinary conversations: Challenging habits of thought","author":"M Strober","year":"2011","unstructured":"Strober M (2011) Interdisciplinary conversations: Challenging habits of thought. Stanford University Press"},{"issue":"6","key":"920_CR45","first-page":"2","volume":"19","author":"M Tarafdar","year":"2018","unstructured":"Tarafdar M, Davison RM (2018) Research in information systems: intra-disciplinary and inter-disciplinary approaches. J Assoc Inf Syst 19(6):2","journal-title":"J Assoc Inf Syst"},{"key":"920_CR46","unstructured":"UNESCO (2023) Artificial intelligence: UNESCO calls on all governments to implement Global Ethical Framework without delay. https:\/\/www.unesco.org\/en\/articles\/artificial-intelligence-unesco-calls-all-governments-implement-global-ethical-framework-without. Accessed 9 Mar 2024"},{"key":"920_CR47","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.jbusres.2019.09.022","volume":"122","author":"PC Verhoef","year":"2021","unstructured":"Verhoef PC, Broekhuizen T, Bart Y, Bhattacharya A, Dong JQ, Fabian N, Haenlein M (2021) Digital transformation: a multidisciplinary reflection and research agenda. J Bus Res 122:889\u2013901","journal-title":"J Bus Res"},{"key":"920_CR48","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10676-018-9476-2","volume":"23","author":"T Winkler","year":"2018","unstructured":"Winkler T, Spiekermann S (2018) Twenty years of value sensitive design: a review of methodological practices in VSD projects. Ethics Inf Technol 23:17\u201321","journal-title":"Ethics Inf Technol"},{"key":"920_CR51","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11576-014-0439-x","volume":"56","author":"H Winter","year":"2014","unstructured":"Winter R (2014) Architectural thinking. Wirtschaftsinformatik 56:395\u2013398","journal-title":"Wirtschaftsinformatik"},{"issue":"3","key":"920_CR49","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1177\/02683962231155937","volume":"38","author":"H Zhao","year":"2023","unstructured":"Zhao H, Jiang N, Cai Z, Lim ET, Tan C-W (2023) Toward a taxonomy of corporate data protection malpractices and their causal mechanisms: a regulatory view. J Inf Technol 38(3):319\u2013333","journal-title":"J Inf Technol"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00920-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-024-00920-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00920-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T15:04:47Z","timestamp":1773068687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-024-00920-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,26]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["920"],"URL":"https:\/\/doi.org\/10.1007\/s12599-024-00920-4","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,26]]},"assertion":[{"value":"2 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}