@article {2023, title = {Perceived benefits of open data are improving but scientists still lack resources, skills, and rewards}, journal = {Humanities and Social Sciences Communications}, volume = {10}, year = {2023}, month = {Jan-12-2023}, doi = {10.1057/s41599-023-01831-7}, author = {Borycz, Joshua and Olendorf, Robert and Specht, Alison and Grant, Bruce and Crowston, Kevin and Tenopir, Carol and Allard, Suzie and Rice, Natalie M. and Hu, Rachael and Sandusky, Robert J.} } @conference {9999, title = {Project archetypes: A blessing and a curse for AI development}, booktitle = {International Conference on Information Systems (ICIS)}, year = {2022}, address = {Copenhagen, Denmark}, abstract = {

Software projects rely on what we propose to call project archetypes, i.e., pre-existing mental images of how projects work. They guide distribution of responsibilities, planning, or expectations. However, with the technological progress, project archetypes may become outdated, ineffective, or counterproductive by impeding more adequate approaches. Understanding archetypes of software development projects is core to leverage their potential. The development of applications using machine learning and artificial intelligence provides a context in which existing archetypes might outdate and need to be questioned, adapted, or replaced. We analyzed 36 interviews from 21 projects between IBM Watson and client companies and identified four project archetypes members initially used to understand the projects. We then derive a new project archetype, cognitive computing project, from the interviews. It can inform future development projects based on AI-development platforms. Project leaders should pro-actively manage project archetypes while researchers should investigate what guides initial understandings of software projects.

}, url = {https://aisel.aisnet.org/icis2022/is_design/is_design/6 }, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/icis_archetypes_rev1_v20_zora.pdf}, author = {Mateusz Dolata and Kevin Crowston and Gerhard Schwabe} } @article {9999, title = {Participation in Community-Based Free/Libre Open Source Software Development Tasks: The Impact of Task Characteristics}, journal = {Internet Research}, volume = {31}, year = {2021}, pages = {1177-1202}, abstract = {

Prior research on participation in FLOSS development has focused mainly on factors at the individual and/or project levels. In this research, we focus on task characteristics and explore their impacts on participation in FLOSS development tasks. Analyzing tasks from five projects in two categories, we find differences in participation related to different task triggers and task topics. Further, our results suggest the mediating role of number of participants in the relationship between task characteristics and the number of messages and the moderating role of project type in the relationships between task characteristics and the number of participants.

}, doi = {10.1108/INTR-03-2020-0112}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/IR\%20to\%20share.pdf}, author = {Kangning Wei and Eseryel, U. Yeliz and Kevin Crowston} } @article {2017, title = {A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT}, journal = {International Journal of Information Management}, volume = {37}, year = {2017}, pages = {566-575}, type = {Journal Article}, abstract = {Historically, organizations owned and controlled the information technologies (IT) their employees used: telephone, inter-office memos, mainframes and timesharing systems. Today, employees often want to use their own IT: not only personal smart phones and tablets, but also Twitter and Google Docs. This new trend can diversify and extend enterprise IT infrastructure, but leaves organizations struggling with technology uses that they cannot control. With the emergence of new technological paradigms in consumer markets and organizations, the management of IT infrastructure requires a more pragmatic and holistic approach that goes beyond simple technological considerations. In this paper, we present a three-part framework{\textemdash}technology, people and practice{\textemdash}that helps managers understand and mitigate these tensions. Drawing on two empirical studies of European executives and consultants form multiple management consulting firms, the paper further outlines changes taking place along the three aspects of the framework. It concludes by discussing three distinct approaches to the management of organizational IT infrastructure (passive, reactive, and pragmatic), and by offering greater insight regarding a pragmatic approach.}, issn = {0268-4012}, doi = {10.1016/j.ijinfomgt.2017.05.016}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/Jarrahi\%20et\%20al\%20\%282017\%29\%20A\%20pragmatic\%20approach\%20to\%20managing\%20enterprise\%20IT\%20infrastructures\%20in\%20the\%20era\%20of\%20consumerization\%20and\%20individualization\%20of\%20IT.pdf}, author = {Mohammad Hossein Jarrahi and Kevin Crowston and Bondar, Kateryna and Bernhard Katzy} } @article {9998, title = {Pursuing best performance in research data management by using the Capability Maturity Model and rubrics}, journal = {Journal of eScience Librarianship}, volume = {6}, year = {2017}, pages = {e1113}, abstract = {OBJECTIVE: To support assessment and improvement of research data management (RDM) practices to increase the reliability of RDM, this paper describes the development of a capability maturity model (CMM) for RDM. Improved RDM is now a critical need, but low awareness of{\textemdash}or indeed lack of{\textemdash}data management is still common among research projects. METHODS: A CMM includes four key elements: key practices, key process areas, maturity levels and and generic processes. These elements were determined for RDM by a review and synthesis of the published literature on and best practices for RDM. RESULTS: The RDM CMM includes five chapters describing five key process areas for research data management: 1) data management in general; 2) data acquisition, processing and quality assurance; 3) data description and representation; 4) data dissemination; and 5) repository services and preservation. In each chapter, key data management practices are organized into four groups according to the CMM{\textquoteright}s generic processes: commitment to perform, ability to perform, tasks performed and process assessment (combining the original measurement and verification). For each of practice, the document provides a rubric to help projects or organizations assess their level of maturity in RDM. CONCLUSIONS: By helping organizations identify areas of strength and weakness, the RDM CMM provides guidance on where effort is needed to improve the practice of RDM. }, doi = {10.7191/jeslib.2017.1113}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/CMM\%20paper\%20to\%20distribute.pdf}, author = {Jian Qin and Kevin Crowston and Arden Kirkland} } @article {9999, title = {Perceived Discontinuities and Continuities in Transdisciplinary Scientific Working Groups}, journal = {Science of the Total Environment}, volume = {534}, year = {2015}, pages = {159-172 }, doi = {10.1016/j.scitotenv.2015.04.121}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/D1\%20Discontinuities\%20to\%20distribute.pdf}, author = {Kevin Crowston and Alison Specht and Carol Hoover and Chudoba, Katherine M. and Mary Beth Watson-Manheim} } @article {9999, title = {{\textquotedblleft}Personas{\textquotedblright} to Support Development of Cyberinfrastructure for Scientific Data Sharing}, journal = {Journal of e-Science Librarianship}, volume = {4}, year = {2015}, month = {11/2015}, chapter = {paper 2}, abstract = {Objective: To ensure that cyberinfrastructure for sharing scientific data is useful, system developers need to understand what scientists and other intended users do with data as well as the attitudes and beliefs that shape that use. This paper introduces personas{\textemdash}detailed descriptions of an {\textquotedblleft}archetypical user of a system{\textquotedblright}{\textemdash}as an approach for capturing and sharing knowledge about potential system users. Setting: Personas were developed to support development of the {\textquoteleft}DataONE{\textquoteright} (Data Observation Network for Earth) project, which has developed and deployed a sustainable long-term data preservation and access network to ensure the preservation and access to multi-scale, multi-discipline, and multi-national environmental and biological science data (https://www.dataone.org/what-dataone) (Michener et al. 2012). Methods: Personas for DataONE were developed based on data from surveys and interviews done by members of DataONE working groups along with sources such as usage scenarios for DataONE and the Data Conservancy project and the Purdue Data Curation Profiles (Witt et al. 2009). Results: A total of 11 personas were developed: five for various kinds of research scientists (e.g., at different career stages and using different types of data); a science data librarian; and five for secondary roles. Conclusion: Personas were found to be useful for helping developers and other project members to understand users and their needs. The developed DataONE personas may be useful for others trying to develop systems or programs for scientists involved in data sharing. }, doi = {10.7191/jeslib.2015.1082}, url = {http://escholarship.umassmed.edu/jeslib/vol4/iss2/2/}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/150728\%20DataONEpersonas.pdf}, author = {Kevin Crowston} } @proceedings {9999, title = {Planet Hunters and Seafloor Explorers: Legitimate Peripheral Participation Through Practice Proxies in Online Citizen Science}, year = {2014}, month = {2/2014}, abstract = {

Making the traces of user participation in primary activities visible in online crowdsourced initiatives has been shown to help new users understand the norms of participation but participants do not always have access to others{\textquoteright} work. Through a combination of virtual and trace ethnography we explore how new users in two online citizen science projects engage other traces of activity as a way of compensating. Merging the theory of legitimate peripheral participation with Erickson and Kellogg{\textquoteright}s theory of social translucence we introduce the concept of practice proxies; traces of user activities in online environment that act as resources to orient newcomers towards the norms of practice. Our findings suggest that newcomers seek out practice proxies in the social features of the projects that highlight contextualized and specific characteristics of primary work practice.

}, doi = {10.1145/2531602.2531721}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/paper_revised\%20copy\%20to\%20post.pdf}, author = {Gabriel Mugar and Carsten {\O}sterlund and Katie DeVries Hassman and Kevin Crowston and Corey Brian Jackson} } @article {9998, title = {Perceived discontinuities and constructed continuities in virtual work}, journal = {Information Systems Journal}, volume = {22}, year = {2012}, month = {01/2012}, pages = {29-52}, doi = {10.1111/j.1365-2575.2011.00371.x}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/ISJ\%20to\%20distribute_0.pdf}, author = {Mary Beth Watson-Manheim and Chudoba, Katherine M. and Kevin Crowston} } @unpublished {2012, title = {Poster: Socially intelligent computing for coding of qualitative data}, year = {2012}, month = {6/2012}, publisher = {Syracuse University School of Information Studies}, type = {Unpublished poster, presented at the SOCS PIs meeting}, address = {Syracuse, NY}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/SOCQA\%20SOCS\%20PI\%20poster\%20small.pdf}, author = {Kevin Crowston and McCracken, Nancy} } @unpublished {2012, title = {Poster: Socially intelligent computing to support citizen science}, year = {2012}, month = {6/2012}, publisher = {Syracuse University School of Information Studies}, type = {Unpublished poster, presented at the SOCS PIs meeting}, address = {Syracuse, NY}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/SOCS\%20CS\%20SOCS\%20PI\%20poster\%20small.pdf}, author = {Kevin Crowston} } @conference {Prestopnik:2012a, title = {Purposeful gaming \& socio-computational systems: A citizen science design case}, booktitle = {Group {\textquoteright}12 Conference}, year = {2012}, month = {10/2012}, address = {Sanibel Island, FL, USA}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/citizensort_cameraready.pdf}, author = {Nathan Prestopnik and Kevin Crowston} } @article {9998, title = {Participation in ICT-Enabled Meetings}, journal = {Journal of Organizational and End User Computing}, volume = {23}, year = {2011}, chapter = {15{\textendash}36}, abstract = {Meetings are a common occurrence in contemporary organizations, and almost everyone shares an understanding of what a meeting is and what participation in a meeting looks like. Yet our exploratory study at Intel, an innovative global technology company, suggests that meetings are evolving beyond this familiar perspective as the pervasive use of information and communication technologies (ICTs) changes work practices associated with meetings. Drawing on data gathered from interviews prompted by entries in the employees{\textquoteright} electronic calendar system, we examine the multiple ways in which meetings build and reflect work in the organization and derive propositions to guide future research. Specifically, we identified four aspects of meetings that reflect work in the 21st century: meetings are integral to work in team-centered organizations, tension between group and personal objectives, discontinuities, and ICT support for fragmented work environment.}, keywords = {Computer-Mediated Communication, Information Technology}, doi = {10.4018/joeuc.2011040102}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/JOEUC_to_distribute.pdf}, author = {Chudoba, Katherine M. and Mary Beth Watson-Manheim and Kevin Crowston and Lee, Chei Sian} } @inbook {2010, title = {Problems in the use-centered development of a taxonomy of web genres}, booktitle = {Genres on the Web: Computational Models and Empirical Studies}, series = {Series: Text, Speech and Language Technology (Series Editors: Ide, Nancy \& V{\'e}ronis, Jean)}, volume = {42}, year = {2010}, month = {2010}, publisher = {Springer}, organization = {Springer}, chapter = {3}, address = {New York}, isbn = {978-90-481-9177-2}, doi = {10.1007/978-90-481-9178-9}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/081024\%20book\%20chapter\%20as\%20submitted.pdf}, author = {Kevin Crowston and Kwa{\'s}nik, Barbara H. and Rubleske, Joe}, editor = {Mehler, Alexander and Sharoff, Serge and Santini, Marina} } @article {2007, title = {A proposed data and analysis archive for research on Free and Open Source Software and its development (Poster)}, year = {2007}, address = {Ann Arbor, MI}, keywords = {FLOSS}, author = {James Howison and Squire, Megan and Kevin Crowston} } @article {2007, title = {A proposed data and analysis archive for research on Free and Open Source Software and its development (Poster)}, year = {2007}, keywords = {FLOSS}, author = {James Howison and Squire, Megan and Kevin Crowston} } @conference {Watson-Manheim:2004, title = {The paradox of discontinuities and continuities: Toward a more comprehensive view of virtuality}, booktitle = {Academy of Management Conference}, year = {2004}, address = {New Orleans, LA}, abstract = {Understanding the fundamental dynamics in virtual work environments is a challenge for organizational researchers. We propose that virtuality is, paradoxically, generally composed of factors that simultaneously simplify and complicate the work environment. We use the metaphorical construction of continuities and discontinuities to explore this phenomenon, and show that considering boundaries as creating discontinuities in work environments enhances our understanding in two ways. First, the language of discontinuities allows us to employ the device of paradox to explore the underlying dynamics of virtuality. This device makes it easier to examine the more complex reality of virtual work. Second, consideration of discontinuities draws attention to possible problems encountered in virtual work environments and ways that individuals and teams may compensate for the tension and differences implicit in discontinuities; in other words, paying attention to the seemingly logical antithesis of discontinuities, or continuities. By taking a process perspective, one can focus on the behavioral component of work, which in turn, has a subjective component. An example from a field study of a global virtual team is examined to illustrate the usefulness of the discontinuities/continuities framework.}, keywords = {Discontinuity, Virtuality}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/paradox2004.pdf}, author = {Mary Beth Watson-Manheim and Chudoba, Katherine M. and Kevin Crowston} } @conference {Howison:2004, title = {The perils and pitfalls of mining SourceForge}, booktitle = {Workshop on Mining Software Repositories, 26th International Conference on Software Engineering}, year = {2004}, address = {Edinburgh, Scotland}, abstract = {SourceForge provides abundant accessible data from Open Source Software development projects, making it an attractive data source for software engineering research. However it is not without theoretical peril and practical pitfalls. In this paper, we outline practical lessons gained from our spidering, parsing and analysis of SourceForge data. SourceForge can be practically difficult: projects are defunct, data from earlier systems has been dumped in and crucial data is hosted outside SourceForge, dirtying the retrieved data. These practical issues play directly into analysis: decisions made in screening projects can reduce the range of variables, skewing data and biasing correlations. SourceForge is theoretically perilous: because it provides easily accessible data items for each project, tempting researchers to fit their theories to these limited data. Worse, few are plausible dependent variables. Studies are thus likely to test the same hypotheses even if they start from different theoretical bases. To avoid these problems, analyses of SourceForge projects should go beyond project level variables and carefully consider which variables are used for screening projects and which for testing hypotheses.}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/The\%20perils\%20and\%20pitfalls\%20of\%20mining\%20SourceForge.pdf}, author = {James Howison and Kevin Crowston} } @proceedings {crowston2000pti, title = {Process as theory in information systems research}, year = {2000}, note = {

Reprinted in Malone, T. W., Crowston, K. \& Herman, G. (Eds.) Organizing Business Knowledge: The MIT Process Handbook (pp. 177{\textendash}190). Cambridge, MA: MIT Press, 2003.

}, pages = {149-164}, publisher = {Kluwer Academic Publishers}, address = {Aalborg, Denmark, 9{\textendash}11 June}, abstract = {

Many researchers have searched for evidence of organizational improvements from the huge sums invested in ICT. Unfortunately, evidence for such a pay back is spotty at best (e.g., Brynjolfsson 1994; Brynjolfsson and Hitt 1998; Meyer and Gupta 1994). On the other hand, at the individual level, computing and communication technologies are increasingly merging into work in ways that make it impossible to separate the two (e.g., Bridges 1995; Gasser 1986; Zuboff 198). This problem{\textemdash}usually referred to as the productivity paradox{\textemdash}is an example of a more pervasive issue: linking phenomena and theories from different levels of analysis. Organizational processes provide a bridge between individual, organizational, and even industrial level impacts of information and communication technologies (ICT). Viewing a process as the way organizations accomplish desired goals and transform inputs into outputs makes the link to organizational outcomes. Viewing processes as ordered collections of activities makes the link to individual work, since individual actors perform these activities. As well, process theories can be a useful milieu for theoretical interplay between interpretive and positivist research paradigms. A process-centered research framework is illustrated with an analysis of the process of seating and serving customers in two restaurants. The analysis illustrates how changes in individual work affect the process and thus the organizational outcomes and how processes provide a theoretical bridge between work at different levels of analysis.

}, keywords = {Process}, doi = {10.1007/978-0-387-35505-4_10}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/ifip2000_long.pdf , https://crowston.syr.edu./sites/crowston.syr.edu/files/ifip2000a.pdf}, author = {Kevin Crowston} } @proceedings {Crowston:1997, title = {Price Behavior in a Market with Internet Buyer{\textquoteright}s Agents (Research in progress paper)}, year = {1998}, address = {Atlanta, GA, USA, December 14{\textendash}17}, keywords = {Electronic Commerce, Internet Agent}, attachments = {https://crowston.syr.edu./sites/crowston.syr.edu/files/icis97.pdf}, author = {Kevin Crowston} }