{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T09:54:28Z","timestamp":1722678868985},"reference-count":47,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T00:00:00Z","timestamp":1410307200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,1]]},"abstract":"Abstract<\/jats:title>Vastly inconsistent definitions of the term \u201cthe IT artifact\u201d in leading journals and conferences demonstrate why it no longer means anything in particular and should be retired from the active IS lexicon. Examples from the literature show why artifact\u2010cousins, such as the IS artifact, sociotechnical artifact, social artifact, and ensemble artifact should be used with great care, if not retired as well. Any void created by these retirements could be filled through the following approaches: (i) relabeling with simple terms that are immediately understandable; (ii) adopting guidelines for making sense of the whole X\u2010artifact family; and (iii) sidestepping the IT artifact and focusing directly on IT\u2010enabled work systems in organizations.<\/jats:p>","DOI":"10.1111\/isj.12048","type":"journal-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T16:11:17Z","timestamp":1410365477000},"page":"47-60","source":"Crossref","is-referenced-by-count":32,"title":["The concept of \u2018IT artifact\u2019 has outlived its usefulness and should be retired now"],"prefix":"10.1111","volume":"25","author":[{"given":"Steven","family":"Alter","sequence":"first","affiliation":[{"name":"School of Management University of San Francisco San Francisco CA USA"}]}],"member":"311","published-online":{"date-parts":[[2014,9,10]]},"reference":[{"key":"e_1_2_6_2_1","volume-title":"Creating the Corporate Future","author":"Ackoff R.","year":"1981"},{"key":"e_1_2_6_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148689"},{"key":"e_1_2_6_4_1","doi-asserted-by":"crossref","first-page":"494","DOI":"10.17705\/1CAIS.01230","article-title":"Sidestepping the IT artifact, scrapping the IS silo, and laying claim to \u201csystems in organizations\u201d","volume":"12","author":"Alter S.","year":"2003","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_6_5_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00323"},{"key":"e_1_2_6_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036527"},{"key":"e_1_2_6_7_1","volume-title":"Race Against the Machine: How the Digital Revolution is Accelerating Innovation, Driving Productivity, and Irreversibly Transforming Employment and the Economy","author":"Brynjolfsson E.","year":"2011"},{"key":"e_1_2_6_8_1","volume-title":"The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies","author":"Brynjolfsson E.","year":"2014"},{"key":"e_1_2_6_9_1","first-page":"196","volume-title":"Power, Action and Belief: A New Sociology of Knowledge?","author":"Callon M.","year":"1986"},{"key":"e_1_2_6_10_1","volume-title":"Through the Looking Glass: And What Alice Found There","author":"Carroll L.","year":"1917"},{"key":"e_1_2_6_11_1","volume-title":"The Design of Inquiring Systems: Basic Concepts of Systems and Organizations","author":"Churchman C.W.","year":"1979"},{"issue":"4","key":"e_1_2_6_12_1","first-page":"83","article-title":"Automated decision making comes of age","volume":"46","author":"Davenport T.H.","year":"2005","journal-title":"MIT Sloan Management Review"},{"key":"e_1_2_6_13_1","doi-asserted-by":"crossref","unstructured":"Denning P. Comer D. Giles D. Mulder M. Tucker A.Turner A.J. et al. (1989)Computing as a discipline: Final report of the task force on the core of computer science.Communications of the ACM January 9\u201323.","DOI":"10.1145\/52964.52975"},{"key":"e_1_2_6_14_1","doi-asserted-by":"crossref","unstructured":"De Souza C. Froehlich J.&Dourish P.(2005)Seeking the source: software source code as a social and technical artifact. InProceedings of the 2005 international ACM SIGGROUP conference on Supporting group work 197\u2013206). ACM.","DOI":"10.1145\/1099203.1099239"},{"key":"e_1_2_6_15_1","volume-title":"Learning, Working, and Imagining: Twelve Studies in Activity Theory","author":"Engestr\u00f6m Y.","year":"1990"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/3556620"},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1100.0612"},{"key":"e_1_2_6_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-76817-0"},{"issue":"1","key":"e_1_2_6_19_1","first-page":"90","article-title":"The IT artefact: An ensemble of the social and the technical?\u2013A rejoinder","volume":"7","author":"Goldkuhl G.","year":"2013","journal-title":"Systems, Signs & Actions"},{"key":"e_1_2_6_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-010-0159-8"},{"key":"e_1_2_6_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2789-7_58"},{"key":"e_1_2_6_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0959-8022(96)00004-5"},{"key":"e_1_2_6_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2003.tb00282.x"},{"key":"e_1_2_6_25_1","unstructured":"ICIS 2013 Website(2013)IT Artifact viewed on Jan. 15 2014 athttp:\/\/icis2013.aisnet.org\/index.php\/tracks\/104\u2010it\u2010artifact"},{"key":"e_1_2_6_26_1","series-title":"Swedish Council for Planning and Coordination of Research","first-page":"55","volume-title":"Ingelstam. L. (1996), Complex Technical Systems","author":"Joerges B.","year":"1996"},{"key":"e_1_2_6_27_1","volume-title":"Acting With Technology: Activity Theory and Interaction Theory","author":"Kaptelinin V.","year":"2006"},{"key":"e_1_2_6_28_1","unstructured":"Lee A.S. Manoj A.T.&Baskerville R.L.(2013)Going back to basics in design: from the IT artifact to the IS artifact AMCIS 2013."},{"key":"e_1_2_6_29_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsea.2012.2201"},{"key":"e_1_2_6_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)00041-2"},{"key":"e_1_2_6_31_1","volume-title":"Systems in Organizations: Bugs & Features","author":"Markus M.L.","year":"1984"},{"key":"e_1_2_6_32_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00176"},{"key":"e_1_2_6_33_1","unstructured":"Matook S.&Brown S.A.(2008)Conceptualizing the IT artifact for MIS research. In24th International Conference on Information Systems ICIS 2008(Vol. 14 No. Paper 102 pp.1\u201311). Association for Information Systems."},{"key":"e_1_2_6_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.65"},{"key":"e_1_2_6_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.129"},{"key":"e_1_2_6_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.3.3.398"},{"key":"e_1_2_6_37_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.2.121.9700"},{"key":"e_1_2_6_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/19416520802211644"},{"key":"e_1_2_6_39_1","unstructured":"Overbye D.(2014)Over the side with old scientific tenets New York Times Jan. 14 2014."},{"key":"e_1_2_6_40_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijeis.2013100107"},{"key":"e_1_2_6_41_1","unstructured":"Pinch T.J.&Bijker W.E.(1987)The social construction of facts and artifacts: Or how the sociology of.The Social Constructions of Technological Systems: New Directions in the Sociology and History of Technology 17."},{"issue":"1","key":"e_1_2_6_42_1","first-page":"133","article-title":"Socio\u2010theoretic accounts of IS: the problem of agency","volume":"17","author":"Rose J.","year":"2005","journal-title":"Scandinavian Journal of Information Systems"},{"key":"e_1_2_6_43_1","unstructured":"Sarker S. Chatterjee S.&Xiao X.(2013)How \u201csociotechnical\u201d is our IS research? an assessment and possible ways forward. InThe 34th International Conference on Information Systems. ICIS 2013."},{"key":"e_1_2_6_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/23043488"},{"issue":"1","key":"e_1_2_6_45_1","first-page":"82","article-title":"Conceptualizing the SocioTechnical (ST) artifact","volume":"7","author":"Silver M.","year":"2013","journal-title":"Systems, Signs & Actions"},{"key":"e_1_2_6_46_1","volume-title":"General Systems Theory: Problems, Perspectives, Practice","author":"Skyttner L.","year":"2005"},{"key":"e_1_2_6_47_1","unstructured":"Taylor J.&Raden N.(2007)Smart enough systems: How to deliver competitive advantage by automating hidden decisions. Pearson Education."},{"key":"e_1_2_6_48_1","volume-title":"Understanding Computers and Cognition","author":"Winograd T.","year":"1986"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12048","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T22:50:38Z","timestamp":1696459838000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,10]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1111\/isj.12048"],"URL":"https:\/\/doi.org\/10.1111\/isj.12048","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,10]]}}}