{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T02:03:39Z","timestamp":1775181819192,"version":"3.50.1"},"reference-count":81,"publisher":"MIS Quarterly","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,1]]},"abstract":"<jats:p>Occupations are increasingly embedded with and affected by digital technologies. These technologies both enable and threaten occupational identity and create two important tensions: they make the persistence of an occupation possible while also potentially rendering it obsolete, and they magnify both the similarity and distinctiveness of occupations with regard to other occupations. Based on the critical case study of an online community dedicated to data science, we investigate longitudinally how data scientists address the two tensions of occupational identity associated with digital technologies and reach transient syntheses in terms of \u201coptimal distinctiveness\u201d and \u201cpersistent extinction.\u201d We propose that identity work associated with digital technologies follows a composite life-cycle and dialectical process. We explain that people constantly need to adjust and redefine their occupational identity, i.e., how they define who they are and what they do. We contribute to scholarship on digital technologies and identity work by illuminating how people deal in an ongoing manner with digital technologies that simultaneously enable and threaten their occupational identity.<\/jats:p>","DOI":"10.25300\/misq\/2021\/16024","type":"journal-article","created":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T16:20:58Z","timestamp":1631722858000},"page":"1087-1112","source":"Crossref","is-referenced-by-count":41,"title":["When Digital Technologies Enable and Threaten Occupational Identity: The Delicate Balancing Act of Data Scientists"],"prefix":"10.25300","volume":"45","author":[{"given":"Emmanuelle","family":"Vaast","sequence":"first","affiliation":[{"name":"McGill University, Montreal, Canada"}]},{"given":"Alain","family":"Pinsonneault","sequence":"additional","affiliation":[{"name":"McGill University, Montreal, Canada"}]}],"member":"10933","published-online":{"date-parts":[[2021,9,1]]},"reference":[{"issue":"1","key":"2025082212244700000_b1-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1146\/annurev.so.19.080193.001155","article-title":"The Sociology of Work and Occupations","volume":"19","author":"Abbott","year":"1993","journal-title":"Annual Review of Sociology"},{"issue":"3","key":"2025082212244700000_b2-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1287\/isre.2014.0546","article-title":"Big Data, Data Science, and Analytics: The Opportunity and Challenge for IS Research","volume":"25","author":"Agarwal","year":"2014","journal-title":"Information Systems Research"},{"issue":"6","key":"2025082212244700000_b3-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1177\/1350508405057474","article-title":"Shielding Idiosyncrasy from Isomorphic Pressures: Towards Optimal Distinctiveness in European Filmmaking","volume":"12","author":"Alvarez","year":"2005","journal-title":"Organization"},{"issue":"1","key":"2025082212244700000_b4-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"6","DOI":"10.5465\/amr.2010.0219","article-title":"The Glass Slipper: \u2018Incorporating\u2019 Occupational Identity in Management Studies","volume":"38","author":"Ashcraft","year":"2013","journal-title":"Academy of Management Review"},{"issue":"4","key":"2025082212244700000_b5-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1279","DOI":"10.1162\/003355303322552801","article-title":"The Skill Content of Recent Technological Change: An Empirical Exploration","volume":"118","author":"Autor","year":"2003","journal-title":"The Quarterly Journal of Economics"},{"key":"2025082212244700000_b6-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1136\/bmj.322.7294.1115","article-title":"Checklists for Improving Rigour in Qualitative Research: A Case of the Tail Wagging the Dog?","volume":"322","author":"Barbour","year":"2001","journal-title":"BMJ"},{"issue":"5","key":"2025082212244700000_b7-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1448","DOI":"10.1287\/orsc.1100.0639","article-title":"Reconfiguring Boundary Relations: Robotic Innovations in Pharmacy Work","volume":"23","author":"Barrett","year":"2012","journal-title":"Organization Science"},{"issue":"1","key":"2025082212244700000_b8-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.10.1.1","article-title":"Electronic Trading and Work Transformation in the London Insurance Market","volume":"10","author":"Barrett","year":"1999","journal-title":"Information Systems Research"},{"issue":"1","key":"2025082212244700000_b9-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1177\/1476127018824838","article-title":"Composing Qualitative Process Research","volume":"19","author":"Berends","year":"2021","journal-title":"Strategic Organization"},{"issue":"3","key":"2025082212244700000_b10-04_16024_ra_vaastpinsonneault","first-page":"3","article-title":"Big Demand for Big Data Scientists in Europe","volume":"58","author":"Blau","year":"2015","journal-title":"Research Technology Management"},{"issue":"4","key":"2025082212244700000_b11-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1287\/orsc.1070.0304","article-title":"Wakes of Innovation in Project Networks: The Case of Digital 3-D Representations in Architecture, Engineering, and Construction","volume":"18","author":"Boland","year":"2007","journal-title":"Organization Science"},{"issue":"5","key":"2025082212244700000_b12-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1287\/orsc.1110.0678","article-title":"Let a Thousand Flowers Bloom? An Early Look at Large Numbers of Software App Developers and Patterns of Innovation","volume":"23","author":"Boudreau","year":"2012","journal-title":"Organization Science"},{"issue":"1","key":"2025082212244700000_b13-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infoandorg.2013.11.001","article-title":"IT-Driven Identity Work: Creating a Group Identity in a Digital Environment","volume":"24","author":"Boudreau","year":"2014","journal-title":"Information and Organization"},{"issue":"5","key":"2025082212244700000_b14-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1177\/0146167291175001","article-title":"The Social Self: On Being the Same and Different at the Same Time","volume":"17","author":"Brewer","year":"1991","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"1","key":"2025082212244700000_b15-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1111\/ijmr.12035","article-title":"Identities and Identity Work in Organizations","volume":"17","author":"Brown","year":"2015","journal-title":"International Journal of Management Review"},{"issue":"1","key":"2025082212244700000_b16-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1093\/icc\/10.1.179","article-title":"Unpacking the Black Box of Modularity: Technologies, Products and Organizations","volume":"10","author":"Brusoni","year":"2001","journal-title":"Industrial and Corporate Change"},{"key":"2025082212244700000_b17-04_16024_ra_vaastpinsonneault","volume-title":"The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies","author":"Brynjolfsson","year":"2014"},{"issue":"4","key":"2025082212244700000_b18-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"931","DOI":"10.25300\/MISQ\/2015\/39.4.9","article-title":"Me, My Self, and I (T): Conceptualizing Information Technology Identity and Its Implications","volume":"39","author":"Carter","year":"2015","journal-title":"MIS Quarterly"},{"key":"2025082212244700000_b19-04_16024_ra_vaastpinsonneault","unstructured":"Chegin, C.\n          \u20082018, \u201cThere Is No Such Thing as a Data Scientist, Medium (https:\/\/medium.com\/indeed-data-science\/theres-no-such-thing-as-a-data-scientist-8dae923c14e3)"},{"issue":"6","key":"2025082212244700000_b20-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.5465\/amj.2007.28226248","article-title":"Interlevel Influences on the Reconstruction of Professional Role Identity","volume":"50","author":"Chreim","year":"2007","journal-title":"Academy of Management Journal"},{"issue":"10","key":"2025082212244700000_b21-04_16024_ra_vaastpinsonneault","first-page":"70","article-title":"Data Scientist","volume":"90","author":"Davenport","year":"2012","journal-title":"Harvard Business Review"},{"key":"2025082212244700000_b22-04_16024_ra_vaastpinsonneault","volume-title":"The Sage Handbook of Qualitative Research","author":"Denzin","year":"2000"},{"issue":"1","key":"2025082212244700000_b23-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1057\/jit.2008.31","article-title":"Who Influences Whom? Analyzing Workplace Referents\u2019 Social Influence on IT Adoption and Non-Adoption","volume":"24","author":"Eckhardt","year":"2009","journal-title":"Journal of Information Technology"},{"issue":"2","key":"2025082212244700000_b24-04_16024_ra_vaastpinsonneault","first-page":"202","article-title":"Beyond Dualism: Stability and Change as a Duality","volume":"35","author":"Farjoun","year":"2010","journal-title":"Academy of Management Review"},{"key":"2025082212244700000_b25-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"87","DOI":"10.4135\/9781473957954.n6","article-title":"Contradictions, Dialectics","volume-title":"The Sage Handbook of Process Organization Studies","author":"Farjoun","year":"2016"},{"key":"2025082212244700000_b26-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","DOI":"10.4135\/9781412986007","volume-title":"Strategies for Interpreting Qualitative Data","author":"Feldman","year":"1995"},{"issue":"2","key":"2025082212244700000_b27-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1177\/1077800405284363","article-title":"Five Misunderstandings About Case-Study Research","volume":"12","author":"Flyvbjerg","year":"2006","journal-title":"Qualitative Inquiry"},{"issue":"4","key":"2025082212244700000_b28-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1287\/isre.2014.0551","article-title":"Special Section Introduction: Information, Technology, and the Changing Nature of Work","volume":"25","author":"Forman","year":"2014","journal-title":"Information Systems Research"},{"key":"2025082212244700000_b29-04_16024_ra_vaastpinsonneault","article-title":"Identity in Organizations: A Review of Information Systems Research","author":"Gal","year":"2009"},{"issue":"1","key":"2025082212244700000_b30-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"10","DOI":"10.2307\/258605","article-title":"Revolutionary Change Theories: A Multilevel Exploration of the Punctuated Equilibrium Paradigm","volume":"16","author":"Gersick","year":"1991","journal-title":"Academy of Management Review"},{"issue":"1","key":"2025082212244700000_b31-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2189\/asqu.2010.55.1.1","article-title":"Forging an Identity: An Insider-Outsider Study of Processes Involved in the Formation of Organizational Identity","volume":"55","author":"Gioia","year":"2010","journal-title":"Administrative Science Quarterly"},{"key":"2025082212244700000_b32-04_16024_ra_vaastpinsonneault","unstructured":"Goodman, J.\n          , 2019, \u201c12 Things I Wish I\u2019d Known before Starting as a Data Scientist,\u201d Medium (https:\/\/medium.com\/deliberate-data-science\/12-things-i-wish-id-known-before-starting-as-a-data-scientist-45989be6300e)."},{"issue":"1","key":"2025082212244700000_b33-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1111\/j.1467-6486.2009.00860.x","article-title":"Florence Nightingale Endures: Legitimizing a New Professional Role Identity","volume":"47","author":"Goodrick","year":"2010","journal-title":"Journal of Management Studies"},{"issue":"4","key":"2025082212244700000_b34-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"755","DOI":"10.2307\/3069414","article-title":"Organizational Change as Discourse : Communicative Actions and Deep Structures in the Context of Information Technology Implementation","volume":"44","author":"Heracleous","year":"2001","journal-title":"Academy of Management Journal"},{"issue":"4","key":"2025082212244700000_b35-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"764","DOI":"10.2307\/2667055","article-title":"Provisional Selves: Experimenting with Image and Identity in Professional Adaptation","volume":"44","author":"Ibarra","year":"1999","journal-title":"Administrative Science Quarterly"},{"issue":"1","key":"2025082212244700000_b36-04_16024_ra_vaastpinsonneault","first-page":"135","article-title":"Identity as Narrative: Prevalence, Effectiveness and Consequences of Narrative Identity Work in Macro Work Role Transitions","volume":"35","author":"Ibarra","year":"2010","journal-title":"Academy of Management Review"},{"issue":"2","key":"2025082212244700000_b37-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1177\/1461444809342524","article-title":"Jus a Guy in Pajamas? Framing the Blogs in Mainstream U.S. Newspaper Coverage (1999-2005)","volume":"12","author":"Jones","year":"2010","journal-title":"New Media & Society"},{"issue":"2","key":"2025082212244700000_b38-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1287\/isre.2018.0827","article-title":"Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective","volume":"30","author":"Karjalainen","year":"2019","journal-title":"Information Systems Research"},{"key":"2025082212244700000_b39-04_16024_ra_vaastpinsonneault","unstructured":"Kepes, B.\n          , 2017, \u201cAutomation and the End of Accounting,\u201d ComputerWorld (https:\/\/www.computerworld.com\/article\/3195070\/automation-and-the-end-of-accounting.html"},{"key":"2025082212244700000_b40-04_16024_ra_vaastpinsonneault","volume-title":"Data Science Salary Survey: Tools, Trends, What Pays (and What Doesn\u2019t) for Data Professionals","author":"King","year":"2014"},{"issue":"1","key":"2025082212244700000_b41-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01972240590895883","article-title":"Information and Communication Technology Challenges to Scientific Professional Identity","volume":"21","author":"Lamb","year":"2005","journal-title":"The Information Society"},{"issue":"4","key":"2025082212244700000_b42-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"691","DOI":"10.2307\/259349","article-title":"Strategies for Theorizing Process Data","volume":"24","author":"Langley","year":"1999","journal-title":"Academy of Management Review"},{"issue":"7","key":"2025082212244700000_b43-04_16024_ra_vaastpinsonneault","first-page":"3","article-title":"Digital Identities and Journalism Content-How Artificial Intelligence and Journalism May Co-Develop and Why Society Should Care","volume":"6","author":"Latar","year":"2009","journal-title":"Innovation Journalism"},{"issue":"3","key":"2025082212244700000_b44-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1287\/isre.14.3.221.16560","article-title":"Generalizing Generalizability in Information Systems Research","volume":"14","author":"Lee","year":"2003","journal-title":"Information Systems Research"},{"key":"2025082212244700000_b45-04_16024_ra_vaastpinsonneault","first-page":"47","article-title":"The Generative Cycle: Linking Knowledge and Relationships","author":"Liedtka","year":"1997","journal-title":"Sloan Management Review"},{"key":"2025082212244700000_b46-04_16024_ra_vaastpinsonneault","unstructured":"Meilleur, C.\n          , 2018, \u201c4 Challenges for Education in the Digital Revolution Era,\u201d KnowledgeOne (https:\/\/knowledgeone.ca\/4-challenges-for-education-in-the-digital-revolution-era\/)."},{"key":"2025082212244700000_b47-04_16024_ra_vaastpinsonneault","volume-title":"Qualitative Data Analysis; An Expanded Sourcebook","author":"Miles","year":"1994","edition":"2nd"},{"key":"2025082212244700000_b48-04_16024_ra_vaastpinsonneault","volume-title":"Qualitative Research in Business and Management","author":"Myers","year":"2008"},{"key":"2025082212244700000_b49-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"439","DOI":"10.2189\/asqu.2010.55.3.439","article-title":"How New Market Categories Emerge: Temporal Dynamics of Legitimacy, Identity, and Entrepreneurship in Satellite Radio, 1990-2005","volume":"55","author":"Navis","year":"2010","journal-title":"Administrative Science Quarterly"},{"issue":"3","key":"2025082212244700000_b50-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"892","DOI":"10.5465\/amj.2012.0201","article-title":"Defining What We Do\u2014All over Again\u2019: Occupational Identity, Technological Change, and the Librarian\/Internet-Search Relationship","volume":"57","author":"Nelson","year":"2014","journal-title":"Academy of Management Journal"},{"issue":"1","key":"2025082212244700000_b51-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.bushor.2014.09.001","article-title":"Digital Innovation Strategy: A Framework for Diagnosing and Improving Digital Product and Service Innovation","volume":"58","author":"Nyl\u00e9n","year":"2015","journal-title":"Business Horizons"},{"issue":"3","key":"2025082212244700000_b52-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1287\/isre.1110.0372","article-title":"Unity in Diversity: Electronic Patient Record Use in Multidisciplinary Practice","volume":"22","author":"Oborn","year":"2011","journal-title":"Information Systems Research"},{"issue":"4","key":"2025082212244700000_b53-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"711","DOI":"10.2307\/259350","article-title":"Building Process Theory with Narrative: From Description to Explanation","volume":"24","author":"Pentland","year":"1999","journal-title":"Academy of Management Review"},{"key":"2025082212244700000_b54-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"254","DOI":"10.4135\/9781473957954.n16","article-title":"Sequential Analysis of Processes","volume-title":"The Sage Handbook of Process Organization Studies","author":"Poole","year":"2016"},{"issue":"2","key":"2025082212244700000_b55-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"235","DOI":"10.5465\/amj.2006.20786060","article-title":"Constructing Professional Identity: The Role of Work and Identity Learning Cycles in the Customization of Identity among Medical Residents","volume":"49","author":"Pratt","year":"2006","journal-title":"Academy of Management Journal"},{"issue":"1","key":"2025082212244700000_b56-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1089\/big.2013.1508","article-title":"Data Science and Its Relationship to Big Data and Data-Driven Decision Making","volume":"1","author":"Provost","year":"2013","journal-title":"Big Data"},{"issue":"1","key":"2025082212244700000_b57-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"65","DOI":"10.5465\/19416520.2016.1162421","article-title":"Contradictions, Dialectics, and Paradoxes in Organizations: A Constitutive Approach","volume":"10","author":"Putnam","year":"2016","journal-title":"Academy of Management Annals"},{"key":"2025082212244700000_b58-04_16024_ra_vaastpinsonneault","unstructured":"Rousset, S.\n          , 2019, \u201cHow Technology iI Disrupting the Consulting Industry,\u201d Consultancy.edu (https:\/\/www.consultancy.eu\/news\/2879\/how-technology-is-disrupting-the-consulting-industry)."},{"issue":"2","key":"2025082212244700000_b59-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1287\/orsc.12.2.179.10113","article-title":"The Dynamics of Alignment: Insights from a Punctuated Equilibrium Model","volume":"12","author":"Sabherwal","year":"2001","journal-title":"Organization Science"},{"issue":"8","key":"2025082212244700000_b60-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"752","DOI":"10.17705\/1jais.00508","article-title":"Learning from First-Generation Qualitative Approaches in the Is Discipline: An Evolutionary View and Some Implications for Authors and Evaluators (Part 1\/2)","volume":"19","author":"Sarker","year":"2018","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"2025082212244700000_b61-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1057\/jit.2012.30","article-title":"Studying Cyborgs: Re-Examining Internet Studies as Human Subjects Research","volume":"27","author":"Schultze","year":"2012","journal-title":"Journal of Information Technology"},{"issue":"6","key":"2025082212244700000_b62-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1086\/228668","article-title":"Identity Work among the Homeless: The Verbal Construction and Avowal of Personal Identities","volume":"92","author":"Snow","year":"1987","journal-title":"American Journal of Sociology"},{"issue":"3","key":"2025082212244700000_b63-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1057\/jit.2012.32","article-title":"Towards an Understanding of Identity and Technology in the Workplace","volume":"28","author":"Stein","year":"2013","journal-title":"Journal of Information Technology"},{"issue":"10","key":"2025082212244700000_b64-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1177\/00187267035610001","article-title":"Managing Managerial Identities: Organizational Fragmentation, Discourse, and Identity Struggle","volume":"56","author":"Sveningsson","year":"2003","journal-title":"Human Relations"},{"key":"2025082212244700000_b65-04_16024_ra_vaastpinsonneault","unstructured":"Thompson, A.\n          , 2019, \u201cData Science Is Dead,\u201d LinkedIn (https:\/\/www.linkedin.com\/pulse\/data-science-dead-alexs-thompson\/)."},{"issue":"4","key":"2025082212244700000_b66-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1057\/ejis.2015.19","article-title":"Identity Metamorphoses in Digital Disruption: A Relational Theory of Identity","volume":"25","author":"Utesheva","year":"2016","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2025082212244700000_b67-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.25300\/MISQ\/2013\/37.4.04","article-title":"Talking About Technology: The Emergence of New Actors with New Media","volume":"37","author":"Vaast","year":"2013","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212244700000_b68-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.infoandorg.2015.02.001","article-title":"Speaking as One, but Not Speaking Up: Dealing with New Moral Taint in an Occupational Online Community","volume":"25","author":"Vaast","year":"2015","journal-title":"Information and Organization"},{"issue":"1","key":"2025082212244700000_b69-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1057\/ejis.2011.26","article-title":"Grounded Theorizing for Electronically-Mediated Social Contexts","volume":"22","author":"Vaast","year":"2013","journal-title":"European Journal of Information Systems"},{"key":"2025082212244700000_b70-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199226290.001.0001","volume-title":"Engaged Scholarship: A Guide for Organizational and Social Research","author":"Van de Ven","year":"2007"},{"issue":"3","key":"2025082212244700000_b71-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"510","DOI":"10.2307\/258786","article-title":"Explaining Development and Change in Organizations","volume":"20","author":"Van de Ven","year":"1995","journal-title":"Academy of Management Review"},{"key":"2025082212244700000_b72-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-319-04948-9_2","article-title":"Data Scientist: The Engineer of the Future","volume-title":"Enterprise Interoperability VI: Interoperability for Agility, Resilience and Plasticity of Collaborations","author":"van der Aalst","year":"2014"},{"key":"2025082212244700000_b73-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1017\/CBO9780511777899.006","article-title":"Identity Work and Control in Occupational Communities","volume-title":"Organizational Control","author":"Van Maanen","year":"2010"},{"issue":"1","key":"2025082212244700000_b74-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1177\/1042258717732779","article-title":"Digital Technologies as External Enablers of New Venture Creation in the It Hardware Sector","volume":"42","author":"von Briel","year":"2018","journal-title":"Entrepreneurship Theory and Practice"},{"issue":"2","key":"2025082212244700000_b75-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1111\/jbl.12010","article-title":"Data Science, Predictive Analytics, and Big Data: A Revolution That Will Transform Supply Chain Design and Management","volume":"34","author":"Waller","year":"2013","journal-title":"Journal of Business Logistics"},{"issue":"2","key":"2025082212244700000_b76-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1057\/ejis.1995.9","article-title":"Interpretive Case Studies in Is Research: Nature and Method","volume":"4","author":"Walsham","year":"1995","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"2025082212244700000_b77-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1057\/ejis.2013.34","article-title":"Who Do You Think You Are? A Review of the Complex Interplay between Information Systems, Identification and Identity","volume":"23","author":"Whitley","year":"2014","journal-title":"European Journal of Information Systems"},{"issue":"5","key":"2025082212244700000_b78-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1287\/orsc.1120.0771","article-title":"Organizing for Innovation in the Digitized World","volume":"23","author":"Yoo","year":"2012","journal-title":"Organization Science"},{"issue":"1","key":"2025082212244700000_b79-04_16024_ra_vaastpinsonneault","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1002\/smj.2589","article-title":"Optimal Distinctiveness: Broadening the Interface between Institutional Theory and Strategic Management","volume":"38","author":"Zhao","year":"2017","journal-title":"Strategic Management Journal"},{"issue":"7","key":"2025082212244700000_b80-04_16024_ra_vaastpinsonneault","first-page":"1974","article-title":"The Generative Internet","volume":"119","author":"Zittrain","year":"2006","journal-title":"Harvard Law Review"},{"key":"2025082212244700000_b81-04_16024_ra_vaastpinsonneault","first-page":"183","article-title":"Optimal Distinctiveness Revisited","volume-title":"The Oxford Handbook of Organizational Identity","author":"Zuckerman","year":"2016"}],"container-title":["MIS Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/45\/3\/1087\/7111\/04_16024_ra_vaastpinsonneault.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/45\/3\/1087\/7111\/04_16024_ra_vaastpinsonneault.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:25:38Z","timestamp":1755879938000},"score":1,"resource":{"primary":{"URL":"https:\/\/misq.umn.edu\/misq\/article\/45\/3\/1087\/1878\/When-Digital-Technologies-Enable-and-Threaten"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":81,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,9,1]]},"published-print":{"date-parts":[[2021,9,1]]}},"URL":"https:\/\/doi.org\/10.25300\/misq\/2021\/16024","relation":{},"ISSN":["0276-7783","2162-9730"],"issn-type":[{"value":"0276-7783","type":"print"},{"value":"2162-9730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,1]]}}}