{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:24:36Z","timestamp":1777854276848,"version":"3.51.4"},"reference-count":127,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Technology"],"published-print":{"date-parts":[[2017,12]]},"abstract":"<jats:p>The number and scale of crowdfunding platforms has increased dramatically in recent years, arguably more so than any other open phenomenon. This increase has allowed several crowdfunding websites to capture significant public attention, e.g. Kickstarter, Indiegogo. Yet, the growth of these specialist websites is only one aspect of the increasing popularity of crowdfunding technologies. Another, less-commonly discussed development is the propagation and integration of crowdfunding technologies into novel hybrid or proprietary production contexts, such as t-shirts (e.g. Threadless) or video games (e.g. Star Citizen). Such integrations are to be expected as crowdfunding technologies grow and evolve. However, they also present new challenges for managers and system designers, as the manner in which different features of crowdfunding technologies are enacted becomes decreasingly predictable the more their application domains diverge. This study performs a socio-material case study of Unbound, an innovative book publisher based in the UK. Unbound uses crowdfunding technologies to help authors raise the funding necessary to publish their books. However, once this funding has been reached, Unbound assumes more typical publisher responsibilities, such as editing, printing, binding, shipping, and promoting these books. Findings from Unbound identify four categories of socio-material practices in this hybrid model, each of which contains multiple sub-practices enacting different material features. This includes practices for fundraising, practices for maintaining traditional publishing standards, practices for creative contribution by backers, and practices for motivations. Further, tensions are observed for each of these categories of practices, due to the conflicting demands for inclusivity and selectivity associated with crowdfunding and publishing, respectively.<\/jats:p>","DOI":"10.1057\/s41265-017-0041-y","type":"journal-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T10:38:34Z","timestamp":1505731114000},"page":"326-343","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":18,"title":["Inclusive Technologies, Selective Traditions: A Socio-material Case Study of Crowdfunded Book Publishing"],"prefix":"10.1177","volume":"32","author":[{"given":"Rob","family":"Gleasure","sequence":"first","affiliation":[{"name":"Cork University Business School, University College Cork, Cork, Ireland;"}]},{"given":"Philip","family":"O'Reilly","sequence":"additional","affiliation":[{"name":"Cork University Business School, University College Cork, Cork, Ireland;"}]},{"given":"Michael","family":"Cahalane","sequence":"additional","affiliation":[{"name":"Information Systems, Technology and Management, University of New South Wales, Sydney, Australia"}]}],"member":"179","published-online":{"date-parts":[[2017,12,1]]},"reference":[{"issue":"2","key":"bibr1-s41265-017-0041-y","first-page":"272","volume":"5","author":"Anney V.N.","year":"2014","journal-title":"Journal of Emerging Trends in Educational Research and Policy Studies"},{"key":"bibr2-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1111\/1467-954X.00226"},{"key":"bibr3-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-1742-2_9"},{"key":"bibr4-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1086\/345321"},{"key":"bibr5-s41265-017-0041-y","volume-title":"International Conference on Information Systems","author":"Beaulieu T.","year":"2013"},{"issue":"1","key":"bibr6-s41265-017-0041-y","first-page":"1","volume":"37","author":"Beaulieu T.","year":"2015","journal-title":"Communications of the Association for Information Systems"},{"key":"bibr7-s41265-017-0041-y","author":"Beier M.","year":"2015","journal-title":"International Conference on Information Systems"},{"key":"bibr8-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusvent.2013.07.003"},{"key":"bibr9-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"bibr10-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/30036527"},{"key":"bibr11-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.48"},{"key":"bibr12-s41265-017-0041-y","author":"Boell S.K.","year":"2012","journal-title":"European Conference on Information Systems"},{"key":"bibr13-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260102"},{"key":"bibr14-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1177\/160940690600500304"},{"issue":"1","key":"bibr15-s41265-017-0041-y","doi-asserted-by":"crossref","first-page":"1","DOI":"10.52214\/cblr.v2012i1.13858","volume":"2012","author":"Bradford C.S.","year":"2012","journal-title":"Columbia Business Law Review"},{"issue":"2","key":"bibr16-s41265-017-0041-y","first-page":"138","volume":"1","author":"Branker K.","year":"2011","journal-title":"Journal of Sustainable Finance & Investment"},{"key":"bibr17-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"bibr18-s41265-017-0041-y","author":"Bretschneider U.","year":"2014","journal-title":"European Conference on Information Systems"},{"key":"bibr19-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0468"},{"key":"bibr20-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.3.07"},{"key":"bibr21-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-07408-2_2"},{"key":"bibr22-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199671533.001.0001"},{"key":"bibr23-s41265-017-0041-y","volume-title":"Creative Industries: Contracts between art and commerce (No. 20)","author":"Caves R.E.","year":"2000"},{"key":"bibr24-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38:3.3"},{"key":"bibr25-s41265-017-0041-y","volume-title":"Constructing Grounded Theory: A practical guide through qualitative analysis","author":"Charmaz K.","year":"2006"},{"key":"bibr26-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2501\/JAR-2016-002"},{"key":"bibr27-s41265-017-0041-y","doi-asserted-by":"crossref","unstructured":"DennehyD., and ConboyK. (2017). Going with the Flow: An activity theory analysis of flow techniques in software development, Journal of Systems and Software (in press). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121216302011.","DOI":"10.1016\/j.jss.2016.10.003"},{"key":"bibr28-s41265-017-0041-y","volume-title":"Grounding Grounded Theory: Guidelines for qualitative inquiry","volume":"282","author":"Dey I.","year":"1999"},{"key":"bibr29-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhs071"},{"key":"bibr30-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/256405"},{"key":"bibr31-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/2393235"},{"key":"bibr32-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"bibr33-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/256313"},{"key":"bibr34-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1080\/13639080020028747"},{"key":"bibr35-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809989.020"},{"key":"bibr36-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511812774"},{"key":"bibr37-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0204_5"},{"key":"bibr38-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1100.0612"},{"key":"bibr39-s41265-017-0041-y","author":"Feller J.","year":"2016","journal-title":"Journal of Information Technology"},{"key":"bibr40-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1177\/1077800405284363"},{"key":"bibr41-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1080\/13691066.2014.916512"},{"key":"bibr42-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.48.SPL.S130"},{"key":"bibr43-s41265-017-0041-y","volume-title":"The Piracy Effect","author":"Gallio N.","year":"2013"},{"key":"bibr44-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1145\/2316936.2316946"},{"key":"bibr45-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/30036519"},{"key":"bibr46-s41265-017-0041-y","author":"Gerber E.M.","year":"2012","journal-title":"Proceedings of the International Workshop on Design, Influence, and Social Technologies: Techniques, impacts and ethics"},{"key":"bibr47-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18017-5_2"},{"key":"bibr48-s41265-017-0041-y","author":"Gierczak M.","year":"2014","journal-title":"International Conference on Information Systems"},{"key":"bibr49-s41265-017-0041-y","volume-title":"Emergence vs Forcing: Basics of grounded theory analysis","author":"Glaser B.G.","year":"1992"},{"key":"bibr50-s41265-017-0041-y","volume-title":"The Discovery of Grounded Theory: Strategies for qualitative research","author":"Glaser B.G.","year":"1967"},{"key":"bibr51-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2015.09.001"},{"key":"bibr52-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2016.09.001"},{"key":"bibr53-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00439"},{"key":"bibr54-s41265-017-0041-y","volume-title":"Ethnography and Qualitative Design in Educational Research","volume":"19","author":"Goetz J.P.","year":"1984"},{"key":"bibr55-s41265-017-0041-y","volume-title":"Handbook of Qualitative Research","author":"Guba E.G.","year":"1994"},{"key":"bibr56-s41265-017-0041-y","author":"Haas P.","year":"2014","journal-title":"International Conference for Information Systems"},{"key":"bibr57-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1111\/ecin.12319"},{"key":"bibr58-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-08-2014-0202"},{"key":"bibr59-s41265-017-0041-y","volume-title":"Crowdsourcing: Why the power of the crowd is driving the future of business","author":"Howe J.","year":"2008"},{"key":"bibr60-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468515"},{"key":"bibr61-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2011.03.001"},{"key":"bibr62-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.28945\/1429"},{"key":"bibr63-s41265-017-0041-y","first-page":"103","volume-title":"Context and Consciousness: Activity theory and human computer interaction","author":"Kaptelinin V.","year":"1996"},{"issue":"3","key":"bibr64-s41265-017-0041-y","first-page":"424","volume":"75","author":"Katz M.L.","year":"1985","journal-title":"The American Economic Review"},{"key":"bibr65-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2013.01.001"},{"key":"bibr66-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2012.04.002"},{"key":"bibr67-s41265-017-0041-y","author":"Koch J.A.","year":"2015","journal-title":"European Conference on Information Systems"},{"key":"bibr68-s41265-017-0041-y","volume-title":"Crowdfunding Creative Ideas: The dynamics of projects backers in Kickstarter","author":"Kuppuswamy V.","year":"2013"},{"key":"bibr69-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1515\/9781400831616"},{"key":"bibr70-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.1999.tb03480.x"},{"key":"bibr71-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199664054.003.0002"},{"key":"bibr72-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2013.02.002"},{"key":"bibr73-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.5465\/19416521003654160"},{"key":"bibr74-s41265-017-0041-y","author":"Li Z.","year":"2015","journal-title":"International Conference on Information Systems"},{"key":"bibr75-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1057\/s41266-016-0005-z"},{"key":"bibr76-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1120.1560"},{"key":"bibr77-s41265-017-0041-y","volume-title":"Return on Entrepreneurial Passion: A study of funding success and timely delivery in crowdfunding.","author":"Luttner R.","year":"2014"},{"key":"bibr78-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.35"},{"key":"bibr79-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusvent.2013.06.005"},{"key":"bibr80-s41265-017-0041-y","author":"Mollick E.R.","year":"2014","journal-title":"After the Campaign: Outcomes of crowdfunding"},{"key":"bibr81-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00221.x"},{"key":"bibr82-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2013.02.001"},{"key":"bibr83-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2137.003.0008"},{"key":"bibr84-s41265-017-0041-y","volume-title":"Practice Theory, Work, and Organization: An introduction","author":"Nicolini D.","year":"2013"},{"key":"bibr85-s41265-017-0041-y","volume-title":"Knowing in Organizations: A practice-based approach","author":"Nicolini D.","year":"2003"},{"key":"bibr86-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1145\/2103354.2103373"},{"key":"bibr87-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.23.1.455"},{"key":"bibr88-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1108\/09564231111155079"},{"key":"bibr89-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1177\/0170840607081138"},{"key":"bibr90-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.2.121.9700"},{"key":"bibr91-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.5465\/19416520802211644"},{"key":"bibr92-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1002\/0470013192.bsa514"},{"key":"bibr93-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.12.009"},{"key":"bibr94-s41265-017-0041-y","first-page":"217","volume-title":"What is a Case? Exploring the foundations of social inquiry","author":"Ragin C.C.","year":"1992"},{"key":"bibr95-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1177\/13684310222225432"},{"key":"bibr96-s41265-017-0041-y","author":"Riggins F.J.","year":"2012","journal-title":"International Conference on Electronic Commerce"},{"key":"bibr97-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00042"},{"key":"bibr98-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.3102\/0034654306298273"},{"key":"bibr99-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1515\/9780271023717"},{"key":"bibr100-s41265-017-0041-y","author":"Schulz M.","year":"2015","journal-title":"12th International Conference on Wirtschaftsinformatik"},{"key":"bibr101-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/259262"},{"key":"bibr102-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.aos.2011.11.005"},{"key":"bibr103-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2013.02.003"},{"key":"bibr104-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1037\/h0042769"},{"key":"bibr105-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.scaman.2015.03.001"},{"key":"bibr106-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1177\/030631289019003001"},{"key":"bibr107-s41265-017-0041-y","volume-title":"Basics of Qualitative Research: Grounded theory procedures and techniques","author":"Strauss A.L.","year":"1990"},{"key":"bibr108-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2006.22083020"},{"key":"bibr109-s41265-017-0041-y","volume-title":"The Wisdom of Crowds","author":"Surowiecki J.","year":"2005"},{"key":"bibr110-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00379"},{"key":"bibr111-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-930708-06-8.ch005"},{"key":"bibr112-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2012.34"},{"key":"bibr113-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2009.00328.x"},{"key":"bibr114-s41265-017-0041-y","author":"Urquhart C.","year":"2012","journal-title":"International Conference on Information Systems"},{"key":"bibr115-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.26"},{"key":"bibr116-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1111\/nhs.12048"},{"key":"bibr117-s41265-017-0041-y","volume-title":"Mind in Society: The development of higher psychological processes","author":"Vygotsky L. S.","year":"1978"},{"key":"bibr118-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00227"},{"key":"bibr119-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00284"},{"key":"bibr120-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2307\/2393789"},{"key":"bibr121-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.tree.2012.11.001"},{"key":"bibr122-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2015.06.040"},{"key":"bibr123-s41265-017-0041-y","volume-title":"Case Study Research: Design and methods","author":"Yin R.K.","year":"2013"},{"key":"bibr124-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.04.001"},{"key":"bibr125-s41265-017-0041-y","author":"Zheng H.","year":"2014","journal-title":"Pacific Asia Conference on Information Systems"},{"key":"bibr126-s41265-017-0041-y","doi-asserted-by":"publisher","DOI":"10.2189\/asqu.52.1.70"},{"key":"bibr127-s41265-017-0041-y","author":"Zvilichovsky D.","year":"2013","journal-title":"International Conference on Information Systems"}],"container-title":["Journal of Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1057\/s41265-017-0041-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/s41265-017-0041-y","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/s41265-017-0041-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/s41265-017-0041-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:04:38Z","timestamp":1777503878000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1057\/s41265-017-0041-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":127,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["10.1057\/s41265-017-0041-y"],"URL":"https:\/\/doi.org\/10.1057\/s41265-017-0041-y","relation":{},"ISSN":["0268-3962","1466-4437"],"issn-type":[{"value":"0268-3962","type":"print"},{"value":"1466-4437","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}