The "Theoretical Lens" Concept: We All Know What it Means, but do We All Know the Same Thing?

The term theoretical lens has grown in usage in business and social science research and particularly in the information systems (IS) discipline. In this paper, we question what the term really means by examining it on several dimensions in the context of its actual use. In particular, we consider 1) where the term appears in each paper, 2) how many conceptualizations of theoretical lens each paper uses, 3) the research method the paper uses, 4) the IS domain the paper considers, and 5) which underlying conceptualizations the paper actually uses. To do so, we examine the full set of actual uses in the IS journal that uses the term most frequently, the European Journal of Information Systems. We conclude by discussing several further questions that these observations raise, which suggest deeper issues about better and less advantageous uses of theoretical lenses in IS research and what these issues might imply for the IS discipline.

[1]  Fred Niederman,et al.  Testing and extending the unfolding model of voluntary turnover to it professionals , 2007 .

[2]  Jongwoo Kim,et al.  Achieving dynamic capabilities with cloud computing: an empirical investigation , 2016, Eur. J. Inf. Syst..

[3]  Ephraim R. McLean,et al.  Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..

[4]  Ned Kock,et al.  The Psychobiological Model: Towards a New Theory of Computer-Mediated Communication Based on Darwinian Evolution , 2004, Organ. Sci..

[5]  Evangelos A. Kiountouzis,et al.  Managing the introduction of information security awareness programmes in organisations , 2015, Eur. J. Inf. Syst..

[6]  Rui Chen,et al.  Learning and self-disclosure behavior on social networking sites: the case of Facebook users , 2015, Eur. J. Inf. Syst..

[7]  Jean-Claude Courbon User-centered DSS design and implementation , 1996 .

[8]  K. Weick ENACTED SENSEMAKING IN CRISIS SITUATIONS[1] , 1988 .

[9]  M. Markus,et al.  Information technology and organizational change: causal structure in theory and research , 1988 .

[10]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[11]  M. Porter Competitive Advantage: Creating and Sustaining Superior Performance , 1985 .

[12]  P. Romer Two Strategies for Economic Development: Using Ideas and Producing Ideas , 1992 .

[13]  A. Giddens The consequences of modernity , 1990 .

[14]  A. Strauss,et al.  Grounded theory , 2017 .

[15]  Shan Ling Pan,et al.  Information technology offshoring in India: a postcolonial perspective , 2013, Eur. J. Inf. Syst..

[16]  J. Kooiman,et al.  Governing as Governance , 2003 .

[17]  R. Oliver Effect of expectation and disconfirmation on postexposure product evaluations: An alternative interpretation. , 1977 .

[18]  John Tooby,et al.  Better than rational: Evolutionary psychology and the invisible hand , 1994 .

[19]  Ephraim R. McLean,et al.  Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit , 2015, Eur. J. Inf. Syst..

[20]  Carl F. Fey,et al.  Institutional theory and MNC subsidiary HRM practices: evidence from a three-country study , 2007 .

[21]  J. Derrida Deconstruction in a Nutshell: A Conversation with Jacques Derrida , 2020 .

[22]  Tawei Wang,et al.  A legitimacy challenge of a cross-cultural interorganizational information system , 2015, Eur. J. Inf. Syst..

[23]  A. Giddens Central Problems In Social Theory , 1979 .

[24]  Patrick Y. K. Chau,et al.  Cross-cultural IS research: perspectives from Eastern and Western traditions , 2015, Eur. J. Inf. Syst..

[25]  Tejaswini Herath,et al.  A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..

[26]  Lihua Huang,et al.  The Role of IS Capabilities in the Development of Multi-Sided Platforms: The Digital Ecosystem Strategy of Alibaba.com , 2015, J. Assoc. Inf. Syst..

[27]  Syed Nasirin,et al.  Grounded theory method in information systems research: its nature, diversity and opportunities , 2013, Eur. J. Inf. Syst..

[28]  J. Brockner The Escalation of Commitment to a Failing Course of Action: Toward Theoretical Progress , 1992 .

[29]  W. Orlikowski Sociomaterial Practices: Exploring Technology at Work , 2007 .

[30]  Bill Doolin,et al.  Sociomateriality and boundary objects in information systems development , 2012, Eur. J. Inf. Syst..

[31]  B. Wernerfelt,et al.  A Resource-Based View of the Firm , 1984 .

[32]  Stanley H. Cohen Discipline and Punish: The Birth of the Prison , 2019, Contemporary Sociology: A Journal of Reviews.

[33]  Sung S. Kim,et al.  Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services , 2009, MIS Q..

[34]  Tim Carrigan,et al.  Toward a new sociology of masculinity , 1985, The Making of Masculinities.

[35]  M. Keil,et al.  The effects of sunk cost and project completion on information technology project escalation , 1995 .

[36]  Mark Keil,et al.  Understanding overbidding behavior in C2C auctions: an escalation theory perspective , 2012, Eur. J. Inf. Syst..

[37]  Max Boisot,et al.  Markets and Hierarchies in a Cultural Perspective , 1986 .

[38]  Susan Leigh Star,et al.  Institutional Ecology, `Translations' and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology, 1907-39 , 1989 .

[39]  R. Quinn Beyond Rational Management: Mastering the Paradoxes and Competing Demands of High Performance , 1991 .

[40]  A. Kellerman,et al.  The Constitution of Society : Outline of the Theory of Structuration , 2015 .

[41]  John Tooby,et al.  Introduction: Evolutionary psychology and conceptual integration , 1992 .

[42]  V. G. Ouchi,et al.  A conceptual framework for the design and organizational control mechanisms , 1979 .

[43]  Anol Bhattacherjee,et al.  Why end-users move to the cloud: a migration-theoretic analysis , 2014, Eur. J. Inf. Syst..

[44]  Fred D. Davis A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .

[45]  Martin Christopher,et al.  Logistics and Supply Chain Management: Strategies for Reducing Cost and Improving Service (Second Edition) , 1999 .

[46]  I. Lakatos,et al.  Criticism and the Growth of Knowledge: Falsification and the Methodology of Scientific Research Programmes , 1970 .

[47]  Frantz Rowe,et al.  What literature review is not: diversity, boundaries and recommendations , 2014, Eur. J. Inf. Syst..

[48]  Kalle Lyytinen,et al.  Inter-organizational information systems adoption – a configuration analysis approach , 2011, Eur. J. Inf. Syst..

[49]  Qing Hu,et al.  Research Report: Diffusion of Information Systems Outsourcing: A Reevaluation of Influence Sources , 1997, Inf. Syst. Res..

[50]  Pratim Datta,et al.  The economics and psychology of consumer trust in intermediaries in electronic markets: the EM-Trust Framework , 2008, Eur. J. Inf. Syst..

[51]  M. Smith Field Theory in Social Science: Selected Theoretical Papers. , 1951 .

[52]  A. Pettigrew Context and Action in the Transformation of the Firm , 1987 .

[53]  Kalle Lyytinen,et al.  The limits to language in doing systems design , 2017, Eur. J. Inf. Syst..

[54]  Hung-Pin Shih,et al.  Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters? , 2017, Eur. J. Inf. Syst..

[55]  David Gefen,et al.  The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern , 2015, Eur. J. Inf. Syst..

[56]  Sabine Matook,et al.  Development of an IS change reason–IS change type combinations matrix , 2011, Eur. J. Inf. Syst..

[57]  Lan Cao,et al.  A framework for adapting agile development methodologies , 2009, Eur. J. Inf. Syst..

[58]  K. Weick Theory Construction as Disciplined Imagination , 1989 .

[59]  K. Popper,et al.  Conjectures and refutations;: The growth of scientific knowledge , 1972 .

[60]  Guy Paré,et al.  Re-examining the causal structure of information technology impact research , 2007, Eur. J. Inf. Syst..

[61]  Leyland F. Pitt,et al.  Potential Research Space in MIS: A Framework for Envisioning and Evaluating Research Replication, Extension, and Generation , 2002, Inf. Syst. Res..

[62]  N. Kock,et al.  Media richness or media naturalness? The evolution of our biological communication apparatus and its influence on our behavior toward E-communication tools , 2005, IEEE Transactions on Professional Communication.

[63]  I. Lorge,et al.  Irrelevant rewards in animal learning. , 1936 .

[64]  Ron Weber,et al.  Evaluating and Developing Theories in the Information Systems Discipline , 2012, J. Assoc. Inf. Syst..

[65]  Ephraim R. McLean,et al.  Measuring e-Commerce Success: Applying the DeLone & McLean Information Systems Success Model , 2004, Int. J. Electron. Commer..

[66]  Richard T. Watson,et al.  Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance , 2013, Eur. J. Inf. Syst..

[67]  Tina Blegind Jensen,et al.  Hospitality and hostility in hospitals: a case study of an EPR adoption among surgeons , 2007 .

[68]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[69]  J. Battilana,et al.  BUILDING SUSTAINABLE HYBRID ORGANIZATIONS: THE CASE OF COMMERCIAL MICROFINANCE ORGANIZATIONS , 2010 .

[70]  Wiebe E. Bijker,et al.  Science in action : how to follow scientists and engineers through society , 1989 .

[71]  B. Fredrickson The broaden-and-build theory of positive emotions. , 2004, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.

[72]  Shirin Madon,et al.  Governance lessons from the experience of telecentres in Kerala , 2005, Eur. J. Inf. Syst..

[73]  Cynthia Hardy,et al.  The Power Behind Empowerment: Implications for Research and Practice , 1998 .

[74]  R. Rhodes Understanding governance : policy networks, governance, reflexivity and accountability , 1997 .

[75]  Jeanette Van Akkeren,et al.  An epidemic of pain in an Australian radiology practice , 2007, Eur. J. Inf. Syst..

[76]  Angela Lin,et al.  The social and political construction of technological frames , 2005, Eur. J. Inf. Syst..

[77]  David A. Whetten,et al.  Albert and Whetten Revisited: Strengthening the Concept of Organizational Identity , 2006 .

[78]  S. L. Star,et al.  This is Not a Boundary Object: Reflections on the Origin of a Concept , 2010 .

[79]  V. Grover,et al.  Decisions to Outsource Information Systems Functions: Testing a Strategy‐Theoretic Discrepancy Model , 1995 .

[80]  Richard C. Atkinson,et al.  Human Memory: A Proposed System and its Control Processes , 1968, Psychology of Learning and Motivation.

[81]  Glen Whyte,et al.  Escalating Commitment to a Course of Action: A Reinterpretation , 1986 .

[82]  David Arnott,et al.  Decision support systems evolution: framework, case study and research agenda , 2004, Eur. J. Inf. Syst..

[83]  W. Orlikowski,et al.  Genre Repertoire: The Structuring of Communicative Practices in Organizations , 1994 .

[84]  Shan Ling Pan,et al.  Developing information processing capability for operational agility: implications from a Chinese manufacturer , 2014, Eur. J. Inf. Syst..

[85]  Yu Zhao,et al.  The process of enterprise resource planning implementation and business process re‐engineering: tales from two Chinese small and medium‐sized enterprises , 2008, Inf. Syst. J..

[86]  K. Weick The Generative Properties Of Richness , 2007 .

[87]  Cathy Urquhart,et al.  Everyday power struggles: living in an IOIS project , 2013, Eur. J. Inf. Syst..

[88]  Jane Bennett,et al.  The Enchantment of Modern Life: Attachments, Crossings, and Ethics , 2001 .

[89]  Wanda J. Orlikowski,et al.  Technological frames: making sense of information technology in organizations , 1994, TOIS.

[90]  Cathy Urquhart,et al.  Using grounded theory method in information systems: the researcher as blank slate and other myths , 2013, J. Inf. Technol..

[91]  Lars Mathiassen,et al.  The role of industry infrastructure in telehealth innovations: a multi-level analysis of a telestroke program , 2007, Eur. J. Inf. Syst..

[92]  C. Delbruck,et al.  [The theory of migration]. , 1993, Jahrbucher fur Nationalokonomie und Statistik.

[93]  H. Chaiklin,et al.  How Does Social Science Work? Reflections on Practice , 1993 .

[94]  Wendy K. Smith,et al.  Managing Strategic Contradictions: A Top Management Model for Managing Innovation Streams , 2005 .

[95]  Ephraim R. McLean,et al.  The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..

[96]  J. R. Moore,et al.  The theory of the growth of the firm twenty-five years after , 1960 .

[97]  Michael Tyworth,et al.  Organizational identity and information systems: how organizational ICT reflect who an organization is , 2014, Eur. J. Inf. Syst..

[98]  R. Lamb,et al.  Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change , 1996, Inf. Process. Manag..

[99]  N. Venkatraman,et al.  Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis , 2011, J. Manag. Inf. Syst..

[100]  Jorge Gonçalves,et al.  Fragmentation or cohesion? Visualizing the process and consequences of information system diversity, 1993–2012 , 2016, Eur. J. Inf. Syst..

[101]  Chris Beasley,et al.  Gender & sexuality : Critical theories, critical thinkers , 2005 .

[102]  Rob Kling,et al.  Reconceptualizing Users as Social Actors in Information Systems Research , 2003, MIS Q..

[103]  Shirley Gregor,et al.  The Nature of Theory in Information Systems , 2006, MIS Q..

[104]  Paul Benjamin Lowry,et al.  Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..

[105]  Alexandra Durcikova,et al.  WHAT , I SHOULDN ’ T HAVE DONE THAT ? : THE INFLUENCE OF TRAINING AND JUST-INTIME REMINDERS ON SECURE BEHAVIOR Completed Research Paper , 2013 .

[106]  Juan Rodon,et al.  Analysing IOIS adoption through structural contradictions , 2010, Eur. J. Inf. Syst..

[107]  L. L. Cummings,et al.  Strategic Response to Institutional Influences on Information Systems Outsourcing , 1997 .

[108]  Rudy Hirschheim,et al.  Crowdsourcing of information systems research , 2017, Eur. J. Inf. Syst..

[109]  K. Weick Making Sense of the Organization , 2000 .

[110]  Harold H. Kassarjian Low Involvement:N a Second Look , 1981 .

[111]  K. Lewin,et al.  Group decision and social change. , 1999 .

[112]  N. Venkatraman,et al.  Institutional Initiatives for Technological Change: From Issue Interpretation to Strategic Choice , 1995 .

[113]  M. Boisot,et al.  From Fiefs to Clans and Network Capitalism: Explaining China's Emerging Economic Order , 1996 .

[114]  Lawrence Loh,et al.  Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..

[115]  Katja Bachmeier Powers Of Freedom Reframing Political Thought , 2016 .

[116]  R. Oliver A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions , 1980 .

[117]  K. Weick FROM SENSEMAKING IN ORGANIZATIONS , 2021, The New Economic Sociology.

[118]  Ilze Zigurs,et al.  Managing strategic contradictions in hybrid teams , 2007, Eur. J. Inf. Syst..

[119]  Robert Wayne Gregory,et al.  Blending bureaucratic and collaborative management styles to achieve control ambidexterity in IS projects , 2014, Eur. J. Inf. Syst..

[120]  Nicholas Berente,et al.  Dressage, control, and enterprise systems: the case of NASA's Full Cost initiative , 2010, Eur. J. Inf. Syst..

[121]  Neil F. Doherty,et al.  From technical to socio-technical change: tackling the human and organizational aspects of systems development projects , 2005, Eur. J. Inf. Syst..

[122]  A. Quayson,et al.  Postcolonialism: Theory, Practice or Process? , 2000 .

[123]  Helmut Krcmar,et al.  Grounded Theory Methodology in Information Systems Research , 2017, MIS Q..

[124]  Blake E. Ashforth,et al.  Normalizing Dirty Work: Managerial Tactics For Countering Occupational Taint , 2007 .

[125]  R. Emerson Power-Dependence Relations , 1962, Power in Modern Societies.

[126]  Jay R. Galbraith Designing Complex Organizations , 1973 .

[127]  Calvin Meng Lai Chan,et al.  Managing e-Government system implementation: a resource enactment perspective , 2011, Eur. J. Inf. Syst..

[128]  Jeremy Rose,et al.  Trust dynamics in a large system implementation: six theoretical propositions , 2013, Eur. J. Inf. Syst..

[129]  Stephen W. Hawking,et al.  The Illustrated A Brief History of Time , 1996 .

[130]  FROM THE EDITORS ADVANTAGES OF STARTING WITH THEORY , 2017 .

[131]  R. Young,et al.  Postcolonialism: An Historical Introduction , 2001 .

[132]  T. P. Hughes,et al.  The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .

[133]  Atreyi Kankanhalli,et al.  Customers’ preference of online store visit strategies: an investigation of demographic variables , 2010, Eur. J. Inf. Syst..

[134]  H. Kelley,et al.  Communication and Persuasion: Psychological Studies of Opinion Change , 1982 .

[135]  Lawrence B. Mohr,et al.  Explaining organizational behavior , 1982 .

[136]  Heather A. Smith,et al.  Making IT Happen: Critical Issues in IT Management , 2003 .

[137]  Geoff Walsham,et al.  Grounded theorizing for electronically mediated social contexts , 2013, Eur. J. Inf. Syst..

[138]  Nandini Rajagopalan,et al.  TOWARD A THEORY OF STRATEGIC CHANGE: A MULTI-LENS PERSPECTIVE AND INTEGRATIVE FRAMEWORK , 1997 .

[139]  Bonnie Brinton Anderson,et al.  How users perceive and respond to security messages: a NeuroIS research agenda and empirical study , 2016, Eur. J. Inf. Syst..

[140]  B. M. Staw The Escalation of Commitment To a Course of Action , 1981 .

[141]  K. Weick,et al.  Organizing and the Process of Sensemaking , 2005 .

[142]  M. Callon Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay , 1984 .

[143]  Barry M. Staw,et al.  Knee-deep in the Big Muddy: A study of escalating commitment to a chosen course of action. , 1976 .

[144]  Duane T. Wegener,et al.  The elaboration likelihood model: Current status and controversies. , 1999 .

[145]  Fred Niederman,et al.  Design science and the accumulation of knowledge in the information systems discipline , 2012, TMIS.

[146]  Szu-Yuan Sun,et al.  Usability, quality, value and e-learning continuance decisions , 2005, Comput. Educ..

[147]  Ulrich Remus,et al.  The effective promotion of informal control in information systems offshoring projects , 2015, Eur. J. Inf. Syst..

[148]  JoAnne Yates,et al.  It's About Time: Temporal Structuring in Organizations , 2002, Organ. Sci..

[149]  Jonny Holmström,et al.  Requirements engineering blinders: exploring information systems developers’ black-boxing of the emergent character of requirements , 2011, Eur. J. Inf. Syst..

[150]  Blake E. Ashforth,et al.  How can you do it?: Dirty work and the challenge of constructing a positive identity , 1999 .

[151]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[152]  Andrew H. Van de Ven,et al.  Running in Packs to Develop Knowledge-Intensive Technologies , 2005, MIS Q..

[153]  Shirley Gregor,et al.  The Anatomy of a Design Theory , 2007, J. Assoc. Inf. Syst..

[154]  Kalle Lyytinen,et al.  Explaining information systems change: a punctuated socio-technical change model , 2008, Eur. J. Inf. Syst..

[155]  Elpida Prasopoulou,et al.  A half-moon on my skin: a memoir on life with an activity tracker , 2017, Eur. J. Inf. Syst..

[156]  Gerardine DeSanctis,et al.  Use of group decision support systems as an appropriation process , 1989, [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume IV: Emerging Technologies and Applications Track.

[157]  Antonis C. Stylianou,et al.  A process model for analyzing and managing flexibility in information systems , 2014, Eur. J. Inf. Syst..

[158]  Varun Grover,et al.  Business Process Outsourcing: an event study on the nature of processes and firm valuation , 2009, Eur. J. Inf. Syst..

[159]  William H. Glick,et al.  Typologies As a Unique Form Of Theory Building: Toward Improved Understanding and Modeling , 1994 .

[160]  Xin Luo,et al.  Improving multiple-password recall: an empirical study , 2009, Eur. J. Inf. Syst..

[161]  Ben Light,et al.  Introducing Masculinity Studies to Information Systems Research: the case of Gaydar , 2007, Eur. J. Inf. Syst..

[162]  A. Strauss,et al.  Basics of qualitative research: Grounded theory procedures and techniques. , 1993 .

[163]  R. F. I. Smith,et al.  Governance , 2001, The Corporation as a Protagonist in Global History, c. 1550-1750.

[164]  Graeme R. Newman,et al.  On crimes and punishments : fifth edition , 2009 .

[165]  Lars Mathiassen,et al.  Contextual dynamics during health information systems implementation: an event-based actor-network approach , 2008, Eur. J. Inf. Syst..

[166]  John C. Henderson,et al.  Strategic Alignment: Leveraging Information Technology for Transforming Organizations , 1993, IBM Syst. J..

[167]  Adrian J. Slywotzky,et al.  Adaptive Enterprise: Creating and Leading Sense-And-Respond Organizations , 1999 .

[168]  Andrea Carugati,et al.  Escaping ‘localisms’ in IT sourcing: tracing changes in institutional logics in an Italian firm , 2012, Eur. J. Inf. Syst..

[169]  Dorothy E. Leidner,et al.  Bridging the work/social divide: the emotional response to organizational social networking sites , 2012, Eur. J. Inf. Syst..

[170]  Matthew R. Jones,et al.  Giddens's Structuration Theory and Information Systems Research , 2008, MIS Q..

[171]  William G. Ouchi,et al.  Markets, Bureaucracies, and Clans. , 1980 .

[172]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[173]  L. Cosmides,et al.  To appear in: Evolutionary Psychology and the Emotions Handbook of Emotions, 2nd Edition , 2022 .

[174]  Lars Mathiassen,et al.  Scalable growth in IT-enabled service provisioning: a sensemaking perspective , 2011, Eur. J. Inf. Syst..

[175]  F. Heider ATTITUDES AND COGNITIVE ORGANIZATION , 1977 .

[176]  Jasbir Singh Dhaliwal,et al.  Alignment within the corporate IT unit: an analysis of software testing and development , 2011, Eur. J. Inf. Syst..

[177]  Carol W. Hsu,et al.  Frame misalignment: interpreting the implementation of information systems security certification in an organization , 2009, Eur. J. Inf. Syst..

[178]  Daphne R. Raban,et al.  Conversation as a source of satisfaction and continuance in a question-and-answer site , 2012, Eur. J. Inf. Syst..

[179]  K. Weick The social psychology of organizing , 1969 .

[180]  Matthias Lange,et al.  An empirical analysis of the factors and measures of Enterprise Architecture Management success , 2016, Eur. J. Inf. Syst..