You are on page 1of 25

THEORY & REVIEW

THEORIZING THE DIGITAL OBJECT1


Philip Faulkner
Clare College, University of Cambridge,
Cambridge, CB2 1TL, UNITED KINGDOM {pbf1000@cam.ac.uk}

Jochen Runde
Cambridge Judge Business School and Girton College, University of Cambridge,
Cambridge, CB2 1AG, UNITED KINGDOM {j.runde@jbs.cam.ac.uk}

Prompted by perceived shortcomings of prevailing conceptualizations of digital technology in IS, we propose


a theory aimed at capturing both the ontological complexity of digital objects qua objects, and how their iden-
tity and use is bound up with various social associations. We begin with what it is to be an object, the dif-
ferences between material and nonmaterial objects, and various categories of nonmaterial objects including
syntactic objects and bitstrings. Building on these categories we develop a conception of digital objects and
a novel “bearer” theory of how material and nonmaterial objects combine. The role of computation is con-
sidered, and how the identity and system functions of digital objects flow from their social positioning in the
communities in which they arise. Various implications of the theory are identified, focusing on its use as a
conceptual frame through which to view digital phenomena, and its potential to inform existing perspectives
with regard both to how digital technology per se and the relationship between people and digital technology
should be theorized. These implications are illustrated with reference to secondary markets for software, the
treatment of digital resources in the resource-based, knowledge-based, and service-dominant logic views of
organizing, and recent work on sociomateriality.

Keywords: Nonmaterial objects, digital objects, bitstrings, digital technology, social positions, resources,
resource-based view, service-dominant logic, sociomateriality, imbrication

Introduction 1 tegui, 2011; Susarla et al. 2012), 3D printers (Kyriakou et al.


2017), and enterprise systems (Strong and Volkoff 2010;
One of the striking features of the digital revolution has been Sykes 2015).
the proliferation of what we will call digital objects, many of
which have transformed and become indispensable parts of Illuminating as these and similar studies invariably are,
organizational life. Digital objects feature prominently in IS however, their principal focus is on the human and organi-
research and include computer systems and peripherals (Hib- zational implications of the technology in question rather than
beln et al. 2017; Xu et al. 2017), smart devices (Prasopoulou on the devices themselves. The result is that research of this
2017; Yoo 2010), mobile apps (Boudreau 2012; Claussen et kind tends to invoke “pretheoretical understandings” (Ekbia
al. 2013; Hoehle and Venkatesh 2015), emails (Barley et al. 2009, p. 2555) of the entities involved, with the potential lack
2011; Wang et al. 2016), blogs (Aggarwal et al. 2012; Chau of clarity, detail and nuance such understandings often entail.
and Xu 2012; Luo et al. 2017), electronic health records This is not a new observation. Almost 20 years ago, Orli-
(Kohli and Tan 2016), online videos (Kallinikos and Mariá- kowski and Iacono (2001) published a much-cited study
criticizing the IS field for its lack of engagement with its
1 “core subject matter—the information technology (IT) arti-
Suzanne Rivard was the accepting senior editor for this paper. Youngjin
Yoo served as the associate editor. fact” (p. 121). Despite the interest this paper generated,

DOI: 10.25300/MISQ/2019/13136 MIS Quarterly Vol. 43 No. 4, pp. 1-XX/December 2019 1


Faulkner & Runde/Theorizing the Digital Object

various follow-up studies indicate that the situation has The remainder of the paper is devoted to some implications of
changed little in the interim (Akhlaghpour et al. 2013; Ayanso our theory. We begin with its role as a conceptual framework
et al. 2007; Grover and Lyytinen 2015). for future IS research which we illustrate with the emerging
phenomenon of secondary markets for downloaded bitstrings.
The need for a more thorough engagement with digital objects We then consider its potential contribution to theoretical
is all the more acute for the difficult ontological questions that perspectives and debates in IS, highlighting how it might
arise about their structure, mode of being, and other basic augment the conceptions of digital technology associated with
properties. In particular, the intangible, or what we will call the resource-based, knowledge-based, and service-dominant
nonmaterial, nature of many digital objects raises questions logic views, inform discussions between the sociomateriality
about how best to theorize this feature and the properties that and imbrication perspectives regarding how the relationship
flow from it, about how the nonmaterial and the tangible or between people and technology should be theorized, and
material combine, and about how the same nonmaterial thing serve as an illustration of the kind of “blue ocean” theorizing
can exist in many different forms. In addition, there is the advocated by Grover and Lyytinen (2015).
issue that, like other human artifacts, digital objects have
aspects that are community-dependent rather than intrinsic,
especially with respect to being the kind of thing they are, and Conceptualizing Digital Technology
how new kinds emerge and existing kinds become obsolete.
Support for the claim that digital technology is often por-
Our aim in this paper is to propose a theory of digital objects trayed in rather simplistic ways in IS, and for its corollary that
able to do justice to these issues. We begin with a literature the field lacks theories rich enough to do justice to its unique-
review that summarizes the current situation in Information ness and diversity, can be found in many places. We briefly
Systems with respect to the conceptualization of digital tech- review two such sources, beginning with Orlikowski and
nology, first in general terms by focusing on empirical studies Iacono’s (2001) influential empirical study of the depiction of
documenting the lack of engagement with digital objects per the IT artifact in the IS literature and subsequent contributions
se in IS research, and then in more concrete terms by focusing that update and broaden its findings. We then consider some
on specific shortcomings in how digital technology is concep- specific shortcomings of how digital technology is repre-
tualized in the resource-based, knowledge-based, and service- sented in IS, illustrated with reference to recent research
dominant logic views of organizing adopted in parts of IS drawing on the resource-based, knowledge-based, and
research. service-dominant logic views of organizing.

We then present our theory, starting with what an object is in


the abstract, before distinguishing between material and The IT Artifact in IS Research
nonmaterial objects and introducing the important subset of
nonmaterial objects that are syntactic objects. These While perhaps best known for the debates it sparked about the
categories provide the basis for our conceptualization of two identity of the IS field and the place of the IT artifact within
kinds of object at the heart of the digital revolution, the it (King and Lyytinen 2006), the Orlikowski and Iacono
bitstring and the more general category of digital objects. article is first and foremost an appeal for more sophisticated
One of our main theoretical innovations is the concept of theorizing of digital technology. Foreshadowing Ekbia’s
“bearers” of nonmaterial objects—the things a nonmaterial (2009, p. 2555) concerns about pretheoretical understandings,
object may be inscribed on, contained within, or borne Orlikowski and Iacono argue that IS research is over-reliant
by—and we pay particular attention to the capacity of on “commonplace and received notions of technology” (p.
bitstrings to serve as nonmaterial bearers of other nonmaterial 121), a point they illustrate by examining the conceptuali-
objects and the idea that there may exist many layers of such zation of IT artifacts in articles published in Information
bearers. Finally, following some brief observations on the Systems Research during the 1990s.
relationship between digital objects and processes of
computation, we provide an account of the social identity of Orlikowski and Iacono identify 14 distinct approaches to the
digital objects, what they are, so to speak, in the communities IT artifact in the articles in their sample, grouping these into
in which they arise. The guiding idea here is that objects, no the 5 more general views summarized in Table 1.
less than people, occupy social positions that locate them as
components in larger systems, and where such positions are According to Orlikowski and Iacono, the only one of the five
deeply relational, performed, and, crucially, inform the social that is conceptually adequate and able to capture the com-
identity of their occupants. plexity, dynamism, and context dependence of IT artifacts is

2 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

Table 1. Orlikowski and Iacono’s Five Views of IT Artifact Conceptualization


Nominal IT artifacts mentioned in name only or not at all.
Emphasis on the instrumental effects of IT artifacts; what they are and how they work regarded as
Tool technical issues and often black-boxed. Artifacts seen as discrete, unchanging, and independent of
social setting.
Emphasis on the computational powers of IT artifacts; their ability to represent, manipulate, store,
Computational
retrieve, and transmit information.
IT artifacts described in terms of one or more (usually quantitative) surrogate measure taken to
Proxy
represent the essential feature(s) of an artifact.
Emphasis on the interactions, and relationships, between IT artifacts and the groups involved in
Ensemble
their construction, implementation and use.

Table 2. Proportion of Articles Employing Each View of Artifact Conceptualization


Orlikowski & Iacono Akhlaghpour et al. Aysano et al. Grover & Lyytinen
2001 2007 2007 2015
Nominal 24.9% 39.6% 17.3% 30.8%
Tool 20.3% 16.0% 28.4% 21.7%
Computational 24.3% 5.8% 6.1% 11.9%
Proxy 18.1% 23.0% 26.6% 24.5%
Ensemble 12.4% 15.7% 21.7% 11.2%
Sample Period 1990-99 2006-09 2000-06 1998-2012
Sample Size 177 644 549 143
MISQ, ISR, JAIS, JIT,
Journals ISR MISQ, ISR, JMIS MISQ, ISR
EJIS, ISJ
Notes: EJIS = European Journal of Information Systems; ISJ = Information Systems Journal; ISR = Information Systems Research; JAIS = Journal
of the Association for Information Systems; JMIS = Journal of MIS; MISQ = MIS Quarterly.

the ensemble view. In all of the other cases, as they see it, the 2007), with the other two studies reporting figures closer to
IT artifact is under-theorized, “either absent, black-boxed, those of Orlikowski and Iacono. Despite evidence of shifts
abstracted from social life, or reduced to surrogate measures” over time within other categories, notably an apparent decline
(p. 130). in the computational view, the overriding impression remains
of a persistent under-theorization of digital technology in IS
The proportion of articles adopting each view found by research. In the meantime, the list of commentaries, opinion
Orlikowski and Iacono appear in Table 2, along with those of pieces, editorials and calls for papers concerned about the
three more recent studies employing the same methodology situation steadily continues to grow (e.g., Baskerville 2012;
(Akhlaghpour et al. 2013; Ayanso et al. 2007; Grover and Benbasat and Zmud 2003; Grover and Lyytinen 2015;
Lyytinen 2015). Zammuto et al. 2007).

Orlikowski and Iacono calculate that only 12.4% of articles While painting a compelling picture of the situation in IS
adopted the ensemble view, the vast majority, therefore, research in general terms, the preceding studies say little
relying on highly attenuated conceptions of digital tech- about specific features of the objects of digital technology
nology. The fact that these results reflect research published that, in a world of seemingly ever-expanding varieties of
over twenty years ago raises the question of whether the digital technology, might warrant theorizing. To appreciate
situation might not have improved in the interim. But the some of these features and achieve a more finely grained
answer appears to be no. Of the three further studies reported picture of the kind of problems our theory aims to address, we
in Table 2, even the highest reported proportion of articles now consider three prominent meta-theoretical perspectives
adopting the ensemble view is only 21.7% (Ayanso et al. in which digital technologies come to the fore.

MIS Quarterly Vol. 43 No. 4/December 2019 3


Faulkner & Runde/Theorizing the Digital Object

Digital Technologies As Resources of IT business value, we contend there is more to be said


about the devices themselves.
The three perspectives we will focus on are the resource-
based (Barney 1991; Barney and Clark 2007; Dierickx and Where devices are discussed explicitly in the three views,
Cool 1989; Wernerfelt 1984), knowledge-based (Grant 1996; they are often seen primarily as conduits of other, knowledge-
Liebeskind 1996; Nonaka and Takeuchi 1995; Spender 1989, based, resources, such as when a microprocessor is viewed as
1996), and service-dominant logic (Lusch and Vargo 2014; having embedded within it knowledge of various rules of
Vargo and Lusch 2004, 2008a, 2008b, 2011, 2016) views of logic and, partly by virtue of this, the ability to apply
organizing. They are relevant to our purposes for three rea- sequences of instructions to binary data. While consistent
sons. First, in placing resources at the center of organiza- with the emphasis on competences, the devices themselves
tional performance, they have all had to pay attention to tend to be treated in an ontologically naïve and undifferen-
distinguishing different kinds of resource, and then especially tiated way. Despite dealing with a vast range of digital
with regard to the nonmaterial and fluid nature of certain technologies, and while recognizing important differences
types of resource. Second, they are all well developed and between technologies along various operational dimensions
influential in IS research. The manner in which they render such as function, scale, technical platform, and so on,
digital technology is, therefore, highly relevant to the disci- individual accounts typically fail to differentiate meaningfully
pline.2 Third, and finally, the problems we identify with the between things in terms of their mode of being and other basic
three views are representative of weaknesses in the concep- properties. Instead, digital devices, whether smart objects, IT
tualization of digital technology in IS research more widely. infrastructures, software applications, or media files, tend to
be grouped into a single, ontologically homogenous category
Let us begin by observing that, in characterizing digital of IT resource, and where such resources are often portrayed
technologies as resources, all three views devote considerably as straightforwardly physical things.
more attention to IT-related competences in the form of
managerial and technical knowledge, skills, and processes, There is no shortage of examples. From the resource-based
than they do to the devices involved. This is especially true perspective, categories such as IT assets (Nevo and Wade
of work drawing on the resource- and knowledge-based 2010), information technology (Barney and Clark 2007),
views. Wade and Hulland’s (2004) typology of “key IS technological IT resources (Melville et al. 2004), IS infra-
resources,” in which seven of the eight main categories of structure (Wade and Hulland 2004), and tangible IT resources
resource identified are different types of competences, is a (Bharadwaj 2000) all share this quality of ontological homo-
striking example. But more typical, perhaps, is the bipartite geneity. In some cases, the supposed material nature of the
classification employed by Melville et al. (2004), who distin- category’s constituents is made explicit, as with Melville et al.
guish between human and technological IT resources and (2004) ) who describe technological IT resources as a subset
associate competences with the former and devices with the of physical capital resources and Bharadwaj (2000), who
latter. The subsequent emphasis is then overwhelmingly on describes tangible IT resources as “physical IT infrastructure
competences, this because most digital devices are seen as components” (pp. 171-172). In other cases, the mode of being
lacking the characteristics—being difficult to imitate, transfer, of the constituents is left implicit, although the usual impres-
or substitute another resource for—associated with sustained sion is that such things can be readily understood as material,
competitive advantage (Melville et al. 2004; Nevo and Wade physical, things.
2010; Ravichandran et al. 2005; Santhanam and Hartono
2003; Stoel and Muhanna 2009). However, and while there While the service-dominant logic view exhibits a similar lack
is no doubt about the importance of competences as a source of ontological differentiation, it does provide a concep-
tualization of the dual role of digital technologies as both
operand resources, capable only of enabling action, and
2
The resource-based (Bharadwaj 2000; Chuang and Lin 2017; Drnevich and operant resources, capable of initiating action (Akaka and
Croson 2013; Mata et al. 1995; Melville et al. 2004; Mithas et al 2012; Nevo Vargo 2014; Lusch and Nambisan 2015; Nambisan 2013).
and Wade 2010; Ray et al. 2005; Santhanam and Hartono 2003; Wade and
This distinction might be thought to invite ontological reflec-
Hulland 2004) and knowledge-based (Alavi and Leidner 2001; Choi 2018;
Choi and Ryu 2015; Mao et al. 2015; Pavlou et al. 2005; Reychav and tion, since within the service-dominant logic view operand
Weisberg 2009; Setia et al. 2013; Tanriverdi 2005) views have been widely resources are widely seen as material things (e.g., machinery)
used in IS studies of IT-based resources as sources of competitive advantage and operant resources as nonmaterial (e.g., competences).
and the mechanisms through which this may occur. The service-dominant Yet despite provocative examples of the operant ability of
logic view is particularly prominent in recent IS research on digital service
innovation (Eaton et al. 2015; Lusch and Nambisan 2015; Scherer et al. 2015;
digital technologies to trigger exchange and even innovation,
Sriviastava and Shainesh 2015). there is little on the ontological status of the relevant devices,

4 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

whether nonmaterial as well as material entities are being In contrast, the service-dominant logic view has recently seen
considered, and the link between this and the twin roles theoretical developments that address some of the social
ascribed to digital technology. aspects of digital technology. These developments are in
relation to the notion of service ecosystems, understood as
The consequences of ignoring ontological considerations of systems of “resource-integrating actors connected by shared
this kind are significant, since it limits scope to account for institutional arrangements and mutual value creation through
properties things possess by virtue of their mode of being and service exchange” (Vargo and Lusch 2016, pp. 10-11; see
for theorizing the relationship between ontologically distinct also Akaka et al. 2013; Vargo and Lusch 2011; Vargo and
kinds of entity. This problem is likely to be especially severe Akaka 2012). Institutional arrangements here refer to the
in the digital context given that digital devices are typically kind of social structures mentioned above, and where these
complex combinations of the material and the nonmaterial. are seen as both an important type of resource and a key part
of the context within which other resources exist and value
One area in which such issues come to the fore is with respect creation takes place (Akaka et al. 2013). But these develop-
to the informational aspects of digital technologies and the ments have yet to take hold in IS research and so there has
unique ways certain kinds of entities are able to facilitate the been little progress so far in theorizing the social aspects of
storage and transmission of information. It is significant here digital technology from this perspective (although Akaka and
that all three views embrace some notion of resource lique- Vargo (2014) discuss some of the social aspects of technology
faction—“decoupling of information from its related physical generally). Further, there remains considerable scope for the
form or device” (Lusch and Nambisan 2015, p. 160)—seen as development of the service-dominant logic view in this
central to the way digitization and digital communications respect, particularly in regard to the identity of digital objects
have affected knowledge management, collaboration, organi- and how this is related to social positions and their social
zational agility, innovation, and so on (Bharadwaj 2000; Choi positioning.
2018; Lusch et al. 2010; Lusch and Nambisan 2015; Lusch
and Vargo 2014; Mao et al. 2015). As things stand, however,
all three views require a more thorough theorization of this
idea to be able to fully explore its implications. While
A Theory of Digital Objects
relevant concepts are hinted at, for example Lusch and Vargo
Objects
(2014, p. 141) referring to “information resources” and
Barrett et al. (2015, p. 142) to resources “in which the primary
We now present our theory of digital objects, beginning with
component is information,” these notions are usually left
a consideration of objects themselves. We start from a
unexplored. Claims to the effect that liquefaction enables
general, high-level, conception of objecthood and then work
“intertwining the virtual and material layers of work in dif-
down to the main kinds of object germane to the digital world.
ferent ways to enhance organizational performance” (Lusch
and Nambisan 2015, p. 160), suggestive as they may be, are
thus left essentially metaphorical. A Conception of Objects

Our remaining comments concern the social aspects of digital Following Faulkner and Runde (2013), we take objects at
technology, particularly the identity of digital objects, their their most abstract to be entities that possess two charac-
use, and “fit” generally within the social world. The resource- teristics: first, that they endure, and second, save for those so
and knowledge-based views have done little to theorize these basic as not to be composed of constituent parts, that they are
aspects, save for what they say about social complexity: the structured. By an object enduring we mean that it is a type of
idea that certain kinds of resources are enmeshed in webs of continuant, namely something that exists through time and is
social relationships and so intrinsically dynamic, evolving fully present at each and every point in time over the period
over time, and difficult for an organization to control or other of its existence. In this respect, objects may be contrasted
organizations to imitate (Barney and Clark 2007, Chen et al. with things such as events, processes, and other kinds of
2014; Mata et al. 1995). This property is only rarely asso- occurrent that take place and whose different parts occur at
ciated with devices, however, digital or otherwise. Further, different points in time.3 By structured, we mean that an
and this is symptomatic of resource- and knowledge-based
views generally, there is minimal reflection on matters of
3
social ontology—the stuff of the social world, social rules, The terms continuant and occurrent, as well as some of the later distinctions
relations, and the like—that would provide a conceptual and categories we employ (e.g., the distinction between material and non-
material objects, the notion of syntactic objects), are closely related to a
foundation for, and enable more detailed elaboration of, the variety of similar terms found in work in computer and information science
idea of social complexity. aimed at constructing formal and comprehensive taxonomies of the entities

MIS Quarterly Vol. 43 No. 4/December 2019 5


Faulkner & Runde/Theorizing the Digital Object

object is composed of a number of distinct parts, objects in objects are commonplace, not least in the digital realm, and
their own right, that are organized in some way. Thus a typi- we will have more to say about them when we discuss digital
cal flatbed scanner, for example, comprises a light source, objects and the idea of bearers of nonmaterial objects. For the
image sensor, glass panel, control circuitry, and various other moment, the pertinent point about hybrid objects is that they
components, arranged in a way that renders the object as a are necessarily material objects, with the physical mode of
whole capable of converting an analog image into digital being of their material components sustaining the materiality
form. of the hybrid object as a whole.

The category of objects is a broad one on this conception,


extending beyond the kind of physical objects just described Syntactic Objects
to things such as individual human beings and enduring
assemblages of humans and nonhumans. From this point on, While there exist many different kinds of nonmaterial object,
however, we restrict the term object to those that are the most important for our purposes are syntactic objects.
inanimate, in the sense of having exclusively inanimate com- These are objects that consist of symbols arranged into well-
ponents and being, as a whole, inanimate things themselves. formed expressions, where well-formed means that these
This is a departure from Faulkner and Runde (2013) and one expressions adhere to the syntactical and semantic rules of the
we take for two reasons. The first is that it brings us closer to language in which they are couched. Take for example a
ordinary language, where many are uncomfortable describing news article such as that published in The Economist (January
humans and, sometimes, animals as objects. The second rea- 13, 2018) entitled “Beyond Bitcoin: Bitcoin Is No Longer the
son is that it makes for a clear and more natural way of Only Game in Crypto-Currency Town.” Here the symbols
maintaining the distinction between inanimate things and the consist of letters and punctuation marks, the expressions are
larger systems involving humans that feature in the discussion words and sentences, and well-formed means that these words
of social positioning below. and sentences conform to the rules of the English language
and convey the intended meaning of the author. Other
examples of syntactic objects include natural language texts
Material and Nonmaterial Objects such as novels, manuals, and contracts, and textual entities in
artificial languages such as musical notation, Morse code, or
The category of objects can be divided into material and
mathematics.
nonmaterial variants. While the term material has many
meanings (Leonardi 2010), we use it to refer specifically to
It is easy to see that the news article, and by extension any
the physical mode of being of an object, a property we see as
syntactic entity, satisfies the two criteria for nonmaterial
necessarily involving the object concerned having spatial
objecthood set out above: that it is an object and that it has a
attributes such as shape, volume, mass, and location, and
nonphysical mode of being. On the first criterion, the article
where this physicality is manifested in the structure of that
is an object by virtue of being both a continuant and struc-
object, namely its component parts and how these are com-
tured. With respect to the former property, the article is a
bined or arranged. Examples of material objects include
continuant because, once created, it endures over time rather
scanners, smartphones, and servers. Nonmaterial objects have
than being something that takes place in time. With respect
a nonphysical mode of being and so lack spatial attributes of
to the second property, recall that an entity is structured if
the sort just mentioned. Examples here include syntactic
composed of distinct parts organized in some way. In the
objects such as the news articles, operating systems and
case of material objects, structure refers to their physical com-
application software examined below, as well as other kinds
ponents, spatial arrangement, interactions, and so forth. In the
of nonmaterial objects such as protocols, procedures and
case of nonmaterial objects structure again refers to their con-
conceptual schemes.
stituent parts, arrangement, and interactions, but where these
are no longer physical attributes of the object. Returning to
We use the term hybrid to refer to objects that comprise both
our news article, the component parts are letters and punctua-
material and nonmaterial objects as component parts. Such
tion marks arranged to form words and sentences, and this
arrangement is a logical property insofar as the words and
sentences conform to the rules of the language in which it is
and relations found in a given domain. This work is also referred to as written and capture what the author intended to convey.
ontology (see for example Lando et al. (2008) and Poole and Mackworth
(2010, Chapter 13)), although in this case primarily concerned with estab- On our second criterion, the news article is a nonmaterial
lishing vocabularies that can be shared across a range of different applica-
tions rather than the project of understanding and articulating constituents of
object by virtue of its nonphysical mode of being. That is, as
reality that we are concerned with in the present paper. an entity consisting solely of symbols it has none of the

6 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

intrinsic spatial qualities associated with the material entities contains four smaller circles, with the largest of these
described above. While it may be printed or otherwise depicting syntactic objects as a proper subset of nonmaterial
inscribed on various material objects such as magazine pages objects and the next largest depicting bitstrings as a proper
and computer screens, the article itself is at bottom nothing subset of syntactic objects. The two smallest circles then
more than an aspatial series of letters and punctuation marks. depict the set of bitstrings as comprising two proper subsets:
program files (PF) and data files (DF).

Bitstrings
Digital Objects
As the examples already mentioned illustrate, syntactic
objects are ubiquitous in the digital world. However, one type The final category of object we single out is digital objects,
of syntactic object stands out as fundamental. This is the which we define as objects whose component parts include
bitstring, a type of syntactic object made up of bits, the 0s and one or more bitstrings. The set of digital objects, therefore,
1s employed in a binary numbering system, where these bits includes individual bitstrings as a limit case, but generally
are structured according to an appropriate file format so as to refers to a far broader category of objects, usually hybrids, in
be readable by the kind of computer hardware for which they which bitstrings are combined with various types of material
are intended. and nonmaterial components. Thus, in addition to individual
programs and data files, the set of digital objects includes
Bitstrings, often called computer files, are one of the corner- relatively small-scale physical devices, ranging from com-
stones of the digital revolution, since the information stored puter systems, components, and peripherals, including the
and manipulated on almost all silicon-based von Neumann kinds of material and nonmaterial bearers of bitstrings dis-
computers, including traditional transistor-based digital PCs, cussed below, to everyday artifacts with embedded computing
is encoded in bitstrings. Bitstrings divide into two categories: capabilities, as well as larger assemblages such as information
program files and data files. Program files encode sequences systems, computer networks, and digital ecosystems in which
of logical operations, with iterations and conditions, that con- the component parts may be widely spatially distributed, and
stitute the instructions for carrying out particular kinds of complexes of predominantly nonmaterial objects, such as
computation on a given class of hardware. Examples include software suites, web sites, and digital archives. As these
operating systems, applications such as spreadsheet and word examples illustrate, digital objects may be either material or
processing software, browsers, smart phone apps, and games. nonmaterial objects, with hybrids acquiring the physical mode
Data files encode the data used by a computer program or of being of their material components.
system, including documents, datasets, images, videos, and
audio recordings.
Bearers of Nonmaterial Objects

The Picture So Far Our description of the basic constitution of digital objects in
place, we now turn to a topic we regard as fundamental to the
The categories of object introduced so far are summarized in place of digital, and other kinds of, objects in the digital
Figure 1, a Venn diagram in which the rectangular boundary domain. This is the idea that nonmaterial objects may be
denotes the universe of objects and where the two largest inscribed onto, contained within. or borne by other objects,
circles represent the set of material and nonmaterial objects. something we capture with the general notion of bearers of
Since any object must either be material or nonmaterial, there nonmaterial objects.
are no elements lying outside of these two circles. Further-
more, since an object cannot be both material and non-
material, these sets are disjoint and the two circles therefore Material Bearers
nonintersecting. The circle denoting material objects contains
a smaller circle that depicts hybrid objects as a proper subset A basic feature of nonmaterial objects is that in order to be
of material objects.4 The circle denoting nonmaterial objects accessed—to be used, stored, passed to others, etc.—they
must in some way be inscribed onto, contained within, or
borne by a material object of some kind. Thus, for a news
4
While it is tempting to think that hybrid objects should be represented as an article to be read by a human being, for example, it must be
intersection of the set of material objects and the set of nonmaterial objects, displayed on a suitable material object, whether this be the
this would make them at once material and nonmaterial objects, which is not
screen of a computer monitor, tablet, or smartphone, or the
possible. Instead, and notwithstanding their also having nonmaterial compo-
nents, hybrid objects necessarily have a physical mode of being by virtue of page of a newspaper, magazine, or book. Similarly, if that
their material components. article is to be archived, lent to another person, edited, and so

MIS Quarterly Vol. 43 No. 4/December 2019 7


Faulkner & Runde/Theorizing the Digital Object

Universe of Objects

Material Nonmaterial

Hybrid Syntactic
Bitstrings
PF
DF

Figure 1. Types of Objects

on, it must be held or maintained on an appropriate material (kinds of) material bearers, whose location is largely con-
object. Generalizing, we call any material object on which a strained only by the limits of international travel and
nonmaterial object is so inscribed a material bearer of that communications technology.5
nonmaterial object. Notice that a material bearer is neces-
sarily a hybrid object according to our earlier characterization Material bearers are, of course, ubiquitous in the digital realm
of objects. and represent an important type of digital object. We have
already mentioned one example, namely the various kinds of
Two features of the object–bearer relation warrant emphasis screens found not only in laptops, tablets, and smartphones,
here. The first is the ontological distinction it implies be- but also in many industrial and household devices, vehicles,
tween a nonmaterial object and the material objects on which and so on. Another is the numerous different kinds of media
it is inscribed. That is to say, however much access to a device used to store bitstrings in machine-readable form,
nonmaterial object may depend on its material bearers, that including CD- and DVD-ROMs, hard disk and solid-state
nonmaterial object is distinct from any and all of these drives, and memory cards.
material things by virtue of possessing its own particular and
separate attributes. One such property is its nonmaterial mode The main ideas involved here are illustrated in Figure 2, in
of being, from which flow others such as its not degrading which three different material objects (each denoted by a grey
with repeated use and what economists call the property of rectangle)—a hard disk drive, microSD card and DVD-
non-rivalry that its use by one person in no way impinges on ROM—serve as the material bearer of the same nonmaterial
its simultaneous use by any number of others. The distinction object (denoted by a white rectangle), a particular bitstring.
is also essential if we are to recognize the separate properties In each case the object–bearer relation is illustrated by
of material bearers, something of considerable import not showing the nonmaterial object located on top of the relevant
least because an object’s suitability as a material bearer material object, with the bearer in each example being the
depends in part on the properties of that thing. Thus where an digital (and hybrid) object comprising the bitstring and the
object is intended to serve as a material bearer for the relevant material object (i.e. the combination of white and
purposes of archiving a nonmaterial object, properties such as grey rectangle in each case).
durability and portability are likely to be important attributes
of the material object concerned. If instead the primary role
of the bearer is to enable a nonmaterial object to be read,
visual clarity is likely to be a more important property.

The second feature is that, barring physical, legal, or other 5


The term copies is often used in relation to the instances of what we are
constraints, there is no limit to the number of different (kinds calling material bearers of a nonmaterial object, for example, when a maga-
of) material objects on which a given nonmaterial object may zine page on which a news article is inscribed is described as being a copy of
be borne at any point in time or to the range of locations these that article. We avoid the term copy, however, because it risks collapsing, or
various bearers may occupy. Thus many nonmaterial objects, at least obscuring, the distinction between a nonmaterial object and its
material bearers. For example, the page of the magazine (a material object)
the aforementioned news article being a prime example, are on which an article (a nonmaterial object) is inscribed is not literally a copy
nowadays borne concurrently on a vast range of different of that article.

8 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

Bitstring
Hard disk drive

Bitstring
microSD card

Bitstring
DVD-ROM

Figure 2. Three Material Bearers of the Same Bitstring

Our earlier emphasis on the ontological separation between a The idea of nonmaterial bearers is fundamental to the digital
nonmaterial object and its material bearers—in essence, that world, particularly with respect to the role played by bitstrings
they are separate entities with their own distinct properties— and thus digital objects. We have already noted that modern
should in no way be taken to imply a more general separation computing is founded on the manipulation of information
that prohibits causal interactions between the two kinds of encoded in binary form. The significance of bitstrings can
entity. To the contrary, such interactions lie at the heart of then be understood in terms of their role as nonmaterial
our account. Thus, and as we have already made clear, bearers of the various kinds of nonmaterial object corre-
material bearers are vital to practical engagement with non- sponding to the different types of information employed in
material objects: to be accessed, a nonmaterial object must be computing. Thus a program file is the bearer of a set of
borne on a material object. Another example arises in relation instructions associated with a particular series of computa-
to the creation of new nonmaterial objects, a process that may tions, while a data file is the bearer of an image, document,
involve its author reflecting on the nature of the material on dataset, or some other kind of data.
which an object will subsequently be borne. Thus whether an
author opts to include charts, tables, or other figures within a Many of the points made earlier in relation to material bearers
news article may well be influenced by their expectations apply to nonmaterial bearers as well. Again, it is necessary to
regarding the kinds of material bearer(s) on which that article be clear about the ontological distinctions involved: just as it
is likely to be displayed—for example, whether it will be pub- is important to avoid conflating a nonmaterial object with its
lished online as well as in hard copy and, if so, whether most material bearers, it is important to avoid conflating a non-
online readers will read it via a smartphone or via a larger, material object with its nonmaterial bearers. Thus a news
static, computer monitor. article may be borne by a variety of different bitstrings
corresponding to different file formats such as DOCX, TXT,
and XML. Yet the article is distinct from any and all of these
Nonmaterial Bearers bearers since, while the sequence of words that comprise it
will be the same in each case, the bitstring bearers differ, each
In addition to material bearers there are also nonmaterial with their own distinct structures and properties. As before,
bearers of nonmaterial objects. These are cases in which a the properties of these different bearers matter, one illustration
nonmaterial object is borne by or contained within a syntactic of which is the way creation of a nonmaterial object may be
object of some kind. Consider a software testing protocol, a influenced by the attributes of its intended bitstring bearer.
nonmaterial object consisting of a series of procedures aimed Thus the producer of an audiovisual recording is likely to be
at verifying the functionality of some piece of software. The influenced by the properties of the particular multimedia
protocol is not itself a syntactic object as it is not composed format to be used, for example what kinds of information can
of symbols. However, the protocol may be given linguistic be included (e.g., single or multiple audio streams, subtitles,
expression in a variety of ways, such as when it is docu- metadata, etc.), whether the encoding involves lossless or
mented as text for the pages of a training manual. The latter lossy data compression, and so on.
text, a syntactic object in its own right, is also a nonmaterial
bearer of the protocol. Generalizing, we call any syntactic The introduction of nonmaterial bearers also brings additional
object in which a nonmaterial object is so borne or contained features of the object–bearer relation into focus, the most
a nonmaterial bearer of that nonmaterial object. significant of which is that there may be many layers of

MIS Quarterly Vol. 43 No. 4/December 2019 9


Faulkner & Runde/Theorizing the Digital Object

nonmaterial bearers involved, such that a nonmaterial object textual expression of the protocol) involves displaying, and
may be borne by a nonmaterial object, which is itself borne by perhaps subsequently printing, the relevant text.
a nonmaterial object (and so on). This idea holds particular
significance in relation to the information stored in bitstrings.
Continuing our earlier example of the software testing proto- Computation
col, consider what happens when a bitstring bearer of the text
to be used in the training manual is created in MS Word. The We now offer some brief observations on computation, the
resulting DOCX file is itself a nonmaterial object, but at the real-time processes performed by digital computers that
same time also a nonmaterial bearer of the syntactic object involve the algorithmic manipulation of information borne by
that is the linguistic expression of the protocol, which is itself bitstrings. These processes, largely implicit in our account so
a nonmaterial bearer of the original nonmaterial object, the far, are relevant here for their existential relationship with
protocol. If that DOCX file is compressed as a ZIP file, that digital objects. This relationship is two-way, the existence of
ZIP file is then the bearer of a bearer of a bearer of the computation at once depending on and contributing to the
protocol.6 In principle, such layering may be repeated existence of digital objects.
indefinitely. However, all such layers must ultimately bottom
out on a material bearer of some kind, since, as we noted Consider first how the existence of computation depends on
earlier, to be used, stored, or communicated, a nonmaterial certain kinds of digital object. Recall that we described pro-
object must ultimately be borne on a material object. Figure gram files as the bitstring bearers of sets of logical operations
3 summarizes our conception with (layers of) nonmaterial corresponding to the instructions for carrying out particular
bearers now included. types of computation. Whenever a program file is executed
on appropriate hardware this results in a real-time (series of)
This idea of the repeated layering of nonmaterial objects, process(es) of computation, with sequences of events trig-
facilitated by the capacity of bitstrings to act as bearers, seems gered according to the semantics of the instructions encoded
to us one of the defining features of digital technology and a in that program file.7 There are then two ways that the exis-
major factor in what makes contemporary digital objects tence of computation depends on digital objects, including
unique. Notice that the layering involved here is quite dif- program files and computer systems. The first concerns the
ferent from the more familiar notion usually referred to as the initial coming into existence of a computational process, the
layered architecture of digital technologies. This latter idea second with its ongoing existence over the period it runs.
refers to the hierarchical structuring, within devices, of layers
of heterogeneous kinds (such as contents, services, network, Recognition of this connection brings many issues into focus,
device), and where each layer constitutes a distinct, and and the shift to distributed computing provides a particularly
largely separable, design hierarchy (Yoo et al. 2010). salient example here. Consider something as seemingly
simple as visiting a website. The website, a digital object in
We use the term translational actions to refer to practices its own right, comprises bitstring encodings of content such
associated with movement from one layer of bearer to as text, images, and audio, as well as scripts governing its
another. Thus, in the preceding example, moving downward appearance and user experience. Actually accessing the web-
from the top of Figure 3, the original protocol is first captured site, however, requires a much larger assembly of other,
in text (e.g., is written up), this text then encoded in a DOCX mostly digital, objects, including desktop and handheld
file (e.g., is input via keyboard or speech-recognition), this devices on the user side, servers, routers, switches, and the
file then converted to ZIP format (e.g., using compression like on the server side, and the networking equipment linking
software), before finally being stored on a material bearer the two. Many of these objects are themselves capable of
(e.g., saved on a hard disk drive). Moving in the opposite computation, and visiting a website accordingly involves a
direction, accessing the ZIP file from its material bearer, and host of separate but interconnected processes of computation,
subsequently the DOCX file from the ZIP file, involves both concurrent and sequential, of variable length and
retrieval using relevant software, while converting the non- complexity, running on a range of distinct platforms across
human-readable DOCX file to a human-readable bearer (the different locations. The distributed nature of the computation
here, increasingly reflected in devices designed for an Internet
of Things, flows from continued growth in internet access,
6
Another example of this kind of layering occurs in relation to computer
programming, where a given set of logical operations may be encoded in a
variety of different higher-order programming languages, each giving rise to
7
a syntactic object, the source code, that is a nonmaterial bearer of that instruc- In ordinary language, the term computer program often refers to both the bit-
tion set. Each of these syntactic objects could then be encoded in binary as string object and the processes of computation involved in its execution,
machine code for a variety of different processors, giving rise to multiple conflating the two kinds of entity and thereby obscuring the relationship
bitstring encodings of the same source code. between them.

10 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

Nonmaterial object (e.g., software testing protocol)

Nonmaterial bearer (e.g., textual expression of the protocol)

Nonmaterial bearer (e.g., DOCX encoding of the textual expression)

Nonmaterial bearer (e.g., ZIP encoding of the DOCX file)

Material bearer (e.g., hard disk drive)

Figure 3. Layers of Nonmaterial and Material Bearers

coupled with technical developments, particularly in relation The second issue concerns bearers, building on the fact that
to mobile and smart devices, in terms of miniaturization, the creation of new bitstrings usually also entails the creation
performance, and cost. of new material and nonmaterial bearers. This might be
because the new bitstring is itself a bearer of a nonmaterial
Now consider how the existence of digital objects might object (of text, audio, etc.) and/or because the new bitstring
depend on computation rather than the other way around. The must itself be borne in some form (e.g., stored on a local
basic point here is the simple one that processes of com- drive, transferred to the cloud and so on). What this points to
putation are to varying degrees involved in the creation of is that computation typically involves the creation not simply
many types of digital object. Bitstrings are an obvious of new bitstrings—perhaps short-lived, perhaps not; perhaps
example, not least the bearers of the ceaseless flow of emails, located in various places reflecting the distributed nature of
texts, and tweets, news articles and blogs, audio, still images, computing—but also a variety of additional digital objects in
and video on the Internet. But the point applies much more the form of new material and nonmaterial bearers. Transla-
widely once we recognize the role of computation in the tional actions feature heavily here, all to do with the computa-
conception, design, and production of many manufactured tion involved in moving between layers of bearers, as when
digital objects, including computers themselves and the the HTML code sent by a website’s server is converted to
various ancillary devices and equipment involved with their text, images, and so on by the web browsing client, or when
use. However, in contrast to how computation depends on data input by a user is transmitted back to the server and
existing digital objects, the ongoing existence of new digital stored.
objects in most cases, once they have been created, no longer
depends on computation.
The Social Positioning of Digital Objects
Again, recognition of the existential dependence of digital
objects on computation brings a variety of issues into focus, Thus far we have concentrated on the intrinsic features of
and we will mention two that arise in relation to the creation digital objects, portraying them as discrete entities with innate
of new bitstrings. The first concerns the difference between properties that exist and endure independently of their setting.
bitstrings that are the intended outcome of a task and those In this last part of our theory, we turn to their context-
that are not. Examples of the former include the cases in dependent aspects, in particular the way in which the kind of
which a set of media files is compressed to create a single thing they are—smart phone, search engine, banking app, or
archive file, or an audio track ripped from a CD to create an whatever else they may be—depends on their social
MP3 encoding. Here computation is about the use of existing positioning.
digital objects to combine and recombine existing nonmaterial
objects to achieve the desired outcome. Yet in other cases,
and perhaps more typically, new bitstrings arise during com- Social Positioning: Overview
putation as a by-product of the use of digital objects. Cookies
generated while visiting a website are a familiar example, or The perspective on social positioning we draw on is part of a
when an activity tracker generates bitstring encodings of broader social theory developed by Tony Lawson (1997,
metrics such as steps taken, calories burnt, and heart rate. 2003, 2012, 2015, 2016; also see Faulkner et al. 2017). The
New bitstrings of this kind often have a short life span, guiding idea is that, in being assigned a position within some
intended only as temporary files, and may be subject to system by some community, an entity acquires the social
continued modification as computation and use of the relevant identity associated with that position. A social position is a
digital object proceeds. specific status within a system that locates its occupant as a

MIS Quarterly Vol. 43 No. 4/December 2019 11


Faulkner & Runde/Theorizing the Digital Object

component of that system. The social identity of any entity is In assigning an entity to a particular position within a system
then the kind of thing that entity is by virtue of the social the goal is, in general, to achieve a close fit between the
position it occupies. Social positions typically exist indepen- intrinsic capacities of that entity and the requirements of the
dently of, and usually prior to, any individual occupant, system function associated with that position. Where an
something which therefore applies also to the identities they entity’s capacities are well suited to fulfilling its system func-
inform. tion, the positioning is likely to endure. Where the match is
a poor one, however, the positioning is unlikely to be sus-
Perhaps the most familiar examples of social positioning are tained. Most human artifacts, digital or otherwise, are of
those that involve the employment of human beings within the course designed and manufactured with the position they are
systems we commonly refer to as organizations, such as the to occupy in mind, so that they possess capacities tailored to
position of thoracic surgeon within a hospital. This position the specific system functions they are intended to serve. But
denotes a particular status within the hospital and where it is it may happen that an object designed with one system
by virtue of being assigned that status, and so occupying the function in mind may nevertheless be repositioned and
relevant position, that its occupant acquires the associated acquire a different identity and system function as a result
social identity and so is a thoracic surgeon both within the (Cardinale and Runde 2019; Faulkner and Runde 2009).
hospital and the wider community.
Rights and Responsibilities: Social positions are also the
locus of numerous rights and responsibilities, which position-
The Case of Digital Objects occupants become subject to on entering a position. Again,
the point is familiar in the context of employment-related
One of the features of Lawson’s view is that it applies also to positions, with the occupant of the position of thoracic sur-
the organization of systems that include, or are composed geon having the right to decide clinical priorities within their
entirely of, inanimate entities (Faulkner and Runde 2013; department, as well as the responsibility to keep patients
Lawson 2012, 2015, 2016). Of particular relevance here is informed of treatment options, associated risks, and so forth.
the case of positioned objects, where the positions concerned While objects do not themselves enjoy rights or bear respon-
have to do with the practical use to which objects are put. sibilities in the way humans do, the positions they occupy are
Take the class of devices we know as MRI scanners. In the also the subject of rights and responsibilities pertaining to
same way that the social position of thoracic surgeon locates their use, maintenance, and so on. Thus, the right to order
its human occupant as a component of the larger system of a MRI scans may be restricted to particular physicians and
hospital and confers on them the social identity of thoracic
imaging conducted only by suitably qualified radiographers
surgeon, the social position of MRI scanner likewise locates
within a hospital, while the scanner’s warranty imposes
its object occupant as a component of the larger system of a
obligations on its manufacturer and might restrict aspects of
hospital and confers on it the social identity of MRI scanner.
its installation, modification, and so on.
Similarly, the position of electronic medical records (EMR)
software locates its bitstring occupant as a component of a
As these examples show, the rights and responsibilities asso-
larger health care system and confers on that bitstring the
ciated with social positions are typically two-sided, with the
social identity of EMR software.
rights (responsibilities) of one position matched by corre-
sponding responsibilities (rights) associated with other
Aspects of the Social Positioning of Digital Objects positions. This feature reflects the internal-relatedness of
social positions, where the existence of any one social
We will briefly note these three key aspects of the social position presupposes the existence of others (and vice versa).
positioning of digital objects: system functions, rights and Relationality of this sort is common in the digital realm,
responsibilities, and the reproduction and transformation of whether between social positions occupied by digital objects
social positions. alone (e.g., MRI scanner and digital MRI image), between
social positions occupied by digital objects on the one hand
System Functions: Every social position carries with it an and humans on the other (MRI scanner and MRI technician),
expectation that its occupant will contribute to the perfor- or between social positions occupied by humans alone (e.g.,
mance of the relevant system in certain ways, something we surgeon and surgery patient). All of these cases exhibit a
call a system function. This observation applies equally to form of mutual, or co-, constitution between the entities
positioned humans and positioned objects: just as whoever concerned, arising at the level of the social positions they
occupies the position of thoracic surgeon within a hospital is occupy and the social identities they acquire.
expected to treat patients suffering from thoracic disorders, so
the digital object that occupies the position of MRI scanner is The Reproduction and Transformation of Social Posi-
expected to produce detailed images of the inside of the body. tions: Social positions, as well as the relations in which they

12 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

stand and the social identities they inform, exist through being keenly contested—continued growth in both the number and
continuously enacted or performed, and thereby reproduced, variety of bitstrings available to download suggests such
in the practices associated with them. Thus, the social posi- markets are likely to become an increasingly important feature
tion of MRI scanner, as well as its relations to other social of digital commerce. Indeed, companies such as Amazon,
positions and its associated social identity, exists and endures Apple, and Microsoft already hold patents on technologies
through practices such as physicians ordering, radiographers aimed at enabling secondary trade of this sort (Streitfeld
carrying out, and radiologists reporting on the images pro- 2013).
duced by MRI scans of patients. Computation is involved in
many of these practices, and the social positions associated The advent of these markets raises a host of theoretical and
with digital objects, together with their associated relations practical issues, ranging from technological challenges
and identities, would not, therefore, generally exist but for associated with designing suitable online platforms to eco-
processes of computation. nomic consequences that might flow from the monetization of
end-users’ intangible digital “assets.” Our present interest,
Social positions may, of course, also be transformed through however, lies in how our theory may facilitate study of this
human practices, driven by any manner of things including phenomenon and to this end we will concentrate on two
technological developments, accidents, and novel practices particular aspects. The first is ways in which the intrinsic
elsewhere. They may atrophy over time (e.g., the position of properties of bitstrings render their secondary markets dif-
floppy disks associated with legacy IT systems), mutate (e.g., ferent from those for pre-owned material objects. The second
the position of camera as digital photography became wide- is the role of material bearers, particularly with respect to
spread), and new ones emerge (e.g., the position of activity some of the main legal issues associated with the resale of
tracker). The view on social positioning we are advocating downloaded bitstrings. Both aspects highlight the importance
can, therefore, accommodate both continuity and change in of ideas contained in our theory, first, in being able to account
the digital realm, always mindful of the relational and for the characteristics of nonmaterial objects such as bit-
performative aspects of the positioning, identity, and use of strings, and second, in providing the ontological basis for
digital objects, but never so as to lose sight of their intrinsic distinguishing nonmaterial objects from their material and
properties. nonmaterial bearers, and for capturing the relationship
between the two.
The exposition of our theory now complete, we move on to its
potential value to IS research. There are various ways that the intrinsic properties of bit-
strings render markets for pre-owned, downloaded, applica-
tion software and media files different from those for second-
hand material items such as motor vehicles, furniture, or
Implications clothes. We highlight two here. The first is that, by virtue of
their nonmaterial mode of being and combined with the
Given the abstract level at which it is pitched, we believe that availability of low-cost bearer technologies and the reach and
our theory could be fruitfully applied in many areas of IS speed of the Internet, the storage and distribution costs asso-
research. In what follows, we focus on demonstrating its ciated with their online exchange are negligible. It follows
utility as a conceptual framework for investigating phenom- that secondary markets for downloaded bitstrings have the
ena in which digital objects predominate and its potential to potential to be highly efficient, with low transaction costs
inform existing theoretical perspectives in IS. ensuring that most opportunities for trade between potential
buyers and sellers can be achieved. By comparison, the phy-
sicality of material objects can imply larger transactions costs
Bitstrings, Bearers and Markets for and thus less efficient secondary markets. Thus while the
Secondhand Software potential buyer of a secondhand piano may value it more
highly than its current owner, if the cost of transferring that
We begin with an empirical example: the recent emergence object from seller to buyer is too great the exchange will not
of secondary markets for pre-owned downloaded bitstrings occur.
such as application software and media files. Currently
organized around a small number of web-based firms oper- The second way in which the intrinsic features of bitstrings
ating as online intermediaries, these markets make it possible make a difference is that, unlike most material objects, they
for owners of legally downloaded bitstrings to resell them do not degrade with use or age. Pre-owned bitstrings can,
over the Internet. While such markets are in their infancy— therefore, genuinely be sold as being in like-new condition,
with intermediaries only willing to deal in certain kinds of with there being no difference in quality between a file
bitstrings and where the legal status of even this trade is purchased direct from a retailer such as the iTunes Store or

MIS Quarterly Vol. 43 No. 4/December 2019 13


Faulkner & Runde/Theorizing the Digital Object

one bought from an existing end-user. This has at least two copies, or what we call material bearers, of a copyrighted
important implications. The first is that these markets avoid work. As usually understood, the FSD creates an exception
the classic lemons problem often associated with markets for to this right such that ownership of a lawfully acquired
used material goods (Akerlof 1970), where trade may be material bearer of a copyright-protected work permits distri-
reduced or fail to take place entirely simply because buyers bution of that particular material bearer. Thus the owner of a
are unable to distinguish high from low quality items, and legally purchased paperback copy of a novel is permitted to
where sellers and buyers may have to invest in costly dispose of, for example resell, that item as they wish.
signaling and screening activities to overcome these
informational asymmetries. The second is that the non- The key issue in relation to the legality of secondary markets
degradability of bitstrings is a key factor in media and for downloaded bitstrings is whether or not the FSD applies
application software companies’ concerns about secondary in this setting. To the extent that bitstrings mirror the paper-
markets and their motivation for challenging the legality of back example just described, the FSD has transferred to the
such trade. For if pre-owned bitstrings are like-new, their digital realm with little difficulty. Thus in the case of some-
resale provides direct competition to new sales, threatening one having originally purchased a software application borne
profits to a greater degree than would be the case for a on a specific material object such as a DVD-ROM, the FSD
product that wears out over time. permits that person to resell that material object without
infringing the copyright associated with that application. In
What will be evident, we hope, is that the preceding obser- the case of a bitstring purchased online as a download, how-
vations presuppose a conception of digital objects that ever, the situation is rather different, with the link between
explicitly recognizes bitstrings, and nonmaterial objects that bitstring and the material bearer on which it resides being
generally, as separate objects with their own distinct and significantly looser. For although a downloaded bitstring
characteristic properties. For it is these properties, in this case must be borne by a material bearer of some sort, in contrast to
their nonmaterial mode of being and non-degradability, that when it is purchased on an object such as a DVD-ROM, in the
the points above rely on. Such phenomena, in other words, case of a download there is no specific material object to
simply cannot be understood without the kind of ontological which the bitstring is inherently tied at the point of purchase.
distinctions we have been urging.
Two recent legal cases illustrate the issues that can arise as a
The second aspect of this case we want to highlight—the result (Hamilton 2015; Huguenin-Love 2014; Serra 2013;
disputed legal situation surrounding the resale of lawfully Soma and Kugler 2014). In January 2012, Capitol Records,
downloaded bitstrings—puts the spotlight on the material a music publishing company, sued ReDigi, an online inter-
bearers of bitstrings and some of the main translational mediary allowing users to buy and sell audio files previously
actions, particularly the uploading and downloading of files, downloaded from iTunes, for copyright infringement in the
associated with their online exchange. The two sides United States. In March 2013, the courts ruled in favor of
involved in these legal disputes are typically the inter- Capitol (Capitol Records LLC v. ReDigi Inc, U.S. District
mediaries, on one hand, who wish to facilitate trade, and the Court, Southern District of New York, 112-00095), finding
media and software publishing companies, on the other, who that ReDigi’s activities were not covered by the FSD and so
wish to prevent those in possession of lawfully downloaded violated the music publisher’s copyright. Central to the
bitstrings from reselling them. That the current situation is courts’ ruling was its interpretation of ReDigi’s online plat-
unsettled is hardly surprising since trade of this kind is form, whereby those who wish to resell an audio file first
relatively new and the technologies involved are still devel- upload that file to the ReDigi “Cloud Locker” (a remote
oping. There are also strong and conflicting economic server located in Arizona), from which it can then be sold to
interests involved, with the intermediaries as well as the and downloaded by a new purchaser. Although ReDigi’s
potential buyers and sellers of bitstrings standing to gain from software ensures that any uploaded file is removed from a
secondary trade, while, as we have already noted, the pub- user’s own computer, the courts deemed that uploading a file
lishing companies are at risk of erosion of their profits if to the Cloud Locker necessarily involves the creation of a new
reselling is allowed. material bearer of that file rather than the transfer of an
existing one. Since the creation of a new bearer violates the
The main legal principle at stake here is the First Sale Doc- copyright holder’s reproduction rights, the file stored on the
trine (FSD),8 a set of rules originating in the pre-digital era Cloud Locker is unlawful and not, therefore, subject to the
that limit a copyright owner’s exclusive right to distribute FSD. Thus any exchange of an audio file that takes place via
the ReDigi platform was judged unlawful.

8 The courts reached a quite different conclusion in an other-


The same principle is usually referred to as the Exhaustion Doctrine outside
of the United States. wise similar case heard in Europe. In 2012, the European

14 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

Court of Justice considered a case brought by Oracle Inter- The legal aspects of this case also remind us of what is
national, a producer of enterprise software, against UsedSoft, arguably the single most important feature of the bitstring: its
a German firm trading online in pre-owned downloaded capacity to bear nonmaterial objects such as application pro-
application software. Like Capitol Records, Oracle argued grams, audio recordings, and text. Indeed, the legal situation
that the FSD did not apply to downloaded software, since its regarding secondary trade is itself likely to depend on the
resale over the Internet would necessarily violate copyright in particular type of nonmaterial object a bitstring bears, since
much the same way as in the ReDigi case. Yet in this case the different law(s) may apply to bitstring bearers of application
court found in favor of UsedSoft, on the grounds that the FSD software than apply to bitstring bearers of, for example,
did apply so long as the originally downloaded copy of the audio- or e-books. More broadly, this feature highlights that
software was deleted or rendered unusable (UsedSoft v. the demand for bitstrings is a derived one, arising from
Oracle, ECJ, C-128/11, subsequently confirmed by the demand for the nonmaterial object inscribed into a bitstring,
German Federal Supreme Court, 17 July 2014, IZR129/08; rather than for the bitstring itself, and where multiple layers
case note in English (2014)).9 While recognizing that resale of nonmaterial bearer may exist between the bitstring and the
would involve the creation of a new material bearer, the court ultimate object of value. It is this feature that has played, and
deemed this lawful reproduction by virtue of it being nec- will continue to play, such an important role in the shaping of
essary for the use of the software by its lawful owner. digital markets and in the impact of bitstrings generally, and
why it is so important to be clear about the distinct properties
As things stand, then, the U.S. and European rulings on online of the various kinds of objects involved and the relations in
trade in pre-owned bitstrings conflict on a fundamental point, which they stand to each other.
namely the legality or otherwise of the new material bearers
created as part of the process. These decisions, and the Although we have focused on secondary markets for bit-
resulting jurisdictional differences, are likely to have signi- strings, there are many other cases in which similar concep-
ficant consequences for issues ranging from publishers’ tual issues arise and for which our theory might offer an
distribution, license and maintenance models and how they appropriate foundation. One of these concerns the tendency
position themselves in regard to non-transfer restrictions, the among certain consumers to value physical versions of a
design of online platforms employed by intermediaries, all the given item—a magazine, audio recording, or film, say—more
way through to the perverse incentives they may create for highly than its digital variants, despite the advantages the
buyers, who may forego downloading in favor of purchasing latter offer in terms of storage, transportation, and non-
material bearers of nonmaterial objects with an eye to their degradability (Belk 2013; Giles et al. 2007; Petrelli and
potential resale. ReDigi’s own response has been to redesign Whittaker 2010). We have already highlighted one possible
its software in such a way that the resale of audio files no explanation for this, namely the legal difficulties associated
longer involves the creation of new material bearers, with a with the resale of digital goods. A second possibility, how-
view to overcoming the legal objections raised against its ever, is that the strength of psychological ownership that
original platform. Instead, newly purchased files are imme- consumers feel toward a good, and thus the value they attach
diately stored on ReDigi’s own servers, from where its owner to it, depends on their ability to interact and (re-)form asso-
can either play the music directly or, if they wish to sell, ciations with that good in a physical way. Questions of mode
ownership of the file can be transferred to the buyer without of being are central here, the nonmaterial nature of digitized
the creation of a new material bearer (Crooks 2015). A judg- goods, at least in certain cases, contributing directly to their
ment in their appeal of the original ruling, and consequently being valued less than their material counterparts (Atasoy and
the legality of this new arrangement, has been pending since Morewedge 2018).
August 2017.
A somewhat different example concerns the Internet of
As with our earlier discussion of the intrinsic properties of Things, where physical devices with embedded digital sen-
bitstrings, the central role of material bearers in the legal sory and actuation capabilities are linked over networks, and
arguments surrounding secondary trade in downloaded bit- which turns on the coming together of material devices (the
strings offers a similarly clear illustration of the use of our things) with a variety of nonmaterial entities such as software,
theory as a conceptual basis for enquiry. Without the protocols, data, and the like (Gubbi et al. 2013; Miorandi et
distinction between bitstrings and their material bearers, and al. 2012). Similarly, 3D printing, which enables the produc-
an account of the relationship between the two, it would be tion of three-dimensional material objects from their digital
impossible to make sense of the events we have described. representations (Barnatt 2013; Lipson and Kurman 2013) and
constitutes a particularly novel form of translational action,
revolves around bitstrings that are the nonmaterial bearers of
9 representations of the structure—themselves nonmaterial
The ruling also required that if the license originally sold covered multiple
users, the reseller did not divide the license and resell only part of it. objects—of the material object to be produced.

MIS Quarterly Vol. 43 No. 4/December 2019 15


Faulkner & Runde/Theorizing the Digital Object

Our final example concerns the impact of robotics and AI on These refinements become especially valuable when con-
labor markets and differs from the preceding ones in sidering embeddedness in relation to digital technology, this
extending the focus from objects to social positions. Perhaps for the clarity they bring in disentangling the various elements
the most salient issue here, one that threatens to become one involved—knowledge, nonmaterial, and material objects—
of the most pressing organizational and social challenges of and the relations between them. Take Bharadwaj’s (2000, p.
the age, is the displacement of workers by automation and the 175) example of a “lessons learned” database built by a firm
use of material and nonmaterial objects (Brynjolfsson and to capture “the unstructured knowledge of its design team in
McAfee 2012; Ford 2015; Kaplan 2015), that is, of digital the form of wisdom, experience, and stories.” While cap-
objects moving into social positions formerly occupied by turing perfectly the general notion of one resource (knowl-
humans. edge) being embedded in another (the database), there are
important nonmaterial objects in play here too, notably the
text that captures employees’ wisdom, experience, and stories,
The Resource-Based, Knowledge-Based, and and its bitstring bearers embedded in the database. We would
Service-Dominant Logic Views say that the knowledge is embedded in the text, which is in
turn borne by the bitstring. This level of detail seems to us
We now return to the three meta-theoretical views on crucial to capturing the nuances, in particular the unique
organizing reviewed at the beginning of the paper, with the features of the digital objects, involved.
aim of highlighting some specific implications of our theory
for their conceptions of digital technology and of resources On similar lines, our theory also provides a source of useful
generally. adjuncts to the concept of resource liquefaction advanced by
the three views, and especially the role of digitization in
Recall that while all three views distinguish between the enabling “resources to be unbundled, rebundled, integrated,
material and the nonmaterial at the level of resources, they fail and created” (Lusch and Vargo 2014, p. 141). Here we
to do so adequately at the level of objects. Instead, non- suggest that our account of nonmaterial objects, bearers,
material objects such as bitstrings tend to be treated in one of layers, and digital objects in particular provides the concepts
two ways, neither of which is satisfactory. The first and most to develop such ideas coherently in relation to the idea of
common is to interpret them as equivalent, or reducible, to the resources advanced in the three views—both the basic idea of
material things involved in their use. The problem here is that information embedded in, and then separated from, physical
this conflates nonmaterial and material objects, thereby ob- things, and also the idea of unbundling and rebundling, inte-
scuring the distinct properties of, and relationships between, grating and creating.
each. The second is to interpret them as forms of knowledge.
While this potentially captures the intangibility of nonmaterial A second benefit of our theory is that it suggests potentially
objects, the problem again is that this conflates two different useful revisions of categories used in the three views. We
things, nonmaterial objects and knowledge. Our theory will concentrate on the distinction between operand and
avoids these conflations by offering a more finely grained operant resources in service-dominant logic, where the former
understanding of nonmaterial objects as types of resource. are static things requiring “other resources to act on them to
We will illustrate some of the resulting benefits with provide benefit” (Lusch and Vargo 2014, p. 57), and the latter
reference to the idea of resources being embedded and the are dynamic in the sense of “capable of acting on other
possible revision of some widely adopted categories. (potential) resources to create benefit” (Lusch and Vargo
2014, p. 57). There are two points we wish to make in this
As noted earlier, in one way or another all three views regard connection, the first of which is that, while operand resources
knowledge-based resources as embedded in, and transmitted are usually thought of as material appliances, nonmaterial
through, other kinds of resources such as an organization’s objects such as software, media files, and protocols are often
culture, routines, employees, and physical devices. While similarly inert and reliant on other resources to be used. In
there is a clear analogy here with the idea of nonmaterial short, while recognizing the possible operant aspects of soft-
objects being borne by other material and nonmaterial objects, ware (Lusch and Nambisan 2015), on our account the
we would add two refinements in light of our theory. The category of operand resource should be expanded to include
first is that nonmaterial objects, and bitstrings in particular, nonmaterial as well as material objects.
can serve as bearers of knowledge-based resources just as
much as material objects can. The second is that nonmaterial Our second point concerns the relationship between operand
objects can be embedded in other material or nonmaterial and operant resources. Service-dominant logic typically
objects just as much as knowledge can. emphasizes the embedding of operant in operand resources

16 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

(Vargo et al. 2008), as when competences are viewed as control, or to copy, a resource that would otherwise be
transmitted through material devices. But the refinements neglected.
mentioned earlier introduce new possibilities. One of these is
of operant resources being embedded in nonmaterial rather
than material operand resources, such as where knowledge of How People and Technology Come Together
tax law and the ability to complete and submit a valid tax
return are embedded in tax software (Vargo et al. 2008). Our theory of digital objects is a contribution to a wider
Another possibility, epitomized by our notion of bearers of literature in IS about how the relationship between people and
nonmaterial objects, is of operand nonmaterial objects being technology should be theorized (e.g., Cheikh-Ammar 2018;
embedded in other operand objects. And yet another possi- Grover and Lyytinen 2015; Leonardi et al. 2012; Markus and
bility, one that inverts the usual formulation, is where a Silver 2008; Silver and Markus 2013). We will now indicate
nonmaterial operand object such as an organization’s fire one way our theory might add to this literature with reference
evacuation protocol or a clause within a product’s license to two influential perspectives within it: sociomateriality
agreement is embedded in operant knowledge of some form. (Orlikowski 2007, 2010: Orlikowski and Scott 2008, 2014,
Indeed, the idea that there may be many layers of bearers 2015; Scott and Orlikowski 2014; see also Cecez-
opens the way to longer permutations of both operant and Kecmanovic et al. 2014; Jones 2014; Riemer and Johnston
operand resources. 2017) and what we will call imbrication theory (Leonardi
2011, 2012, 2013, 2017; Leonardi and Rodqriguez-Lluesma
We close with two points that illustrate how our theory might 2012).
facilitate the articulation of social aspects of resources,
particularly digital technology, within the three views. The While there is some overlap between the two and both are
first is in connection with the observation by proponents of considerably more nuanced than we have space to detail here,
service-dominant logic that resources are “a function of how they differ unambiguously on a fundamental aspect of
something (tangible or intangible) is or can be used and not a ontology: while sociomateriality denies the existence of
function of things per se” (Lusch and Nambisan 2015, p. discrete things with intrinsic properties (e.g., Scott and
159). There are likely many facets to this claim but one of the Orlikowski 2014, p. 878) and therefore also digital objects as
most important, we contend, is that resources are usually we have theorized them, imbrication theory affirms the oppo-
positioned things, such that the qualities of being a particular site and reserves a central place for technological artifacts
type of resource and having the associated system functions, with intrinsic properties that are “fixed,” even if only tem-
are bound up with the position that an entity occupies, with porarily, and that impact causally on what people do with
how it is related to other (socially positioned) things, and its them (e.g., Leonardi 2012, p. 32).
actually being deployed in accordance with its social posi-
tioning, in the context in which it arises. Our theory provides This difference is dramatic and of a piece with how the two
the means to incorporate these and related ideas into service- perspectives depict organizing processes in technology-rich
dominant logic, and then in a way that complements recent environments. According to sociomateriality, the world
efforts to theorize social structure in relation to service bottoms out in relations and everything within it is the product
ecosystems generally. of intra-action, a “mutual constitution of objects and agencies
of observation within phenomena” (Barad, 2007, p. 197).
Our second point concerns the notion of social complexity, an Organizing processes, in this view, are ones in which the
idea that the resource-based view has yet to adequately boundaries between things flow from “agential cuts” made by
theorize and that it arguably lacks the concepts required to do “agencies of observation” rather than from inherent properties
so. Our theory suggests that the positioning of a resource of the things concerned (Orlikowski 2010, pp. 135-136; Scott
represents one possible source of social complexity, particu- and Orlikowski 2014, pp. 877-880), and where whatever
larly where the positions concerned involve complex internal emerges is co-constituted by agencies of observation just as
relations, where entities simultaneously occupy multiple such agencies are co-constituted by whatever it is they are
positions within one or more communities, and where posi- observing.
tions and positionings change over time. Thinking about the
issue in this way may be of particular relevance to digital (and In contrast, the focus in imbrication theory—where imbricate
other kinds of) objects, where the orthodox view that devices means “to arrange distinct elements in overlapping patterns so
are rarely socially complex is at odds with the ubiquitous that they function interdependently” (Leonardi 2011, p.
positioning of such things, and where this approach may 150)—is on organizing processes in which preexisting tech-
highlight factors that make it difficult for an organization to nological artifacts and mediating “perceptual affordances and

MIS Quarterly Vol. 43 No. 4/December 2019 17


Faulkner & Runde/Theorizing the Digital Object

constraints” of human actors interact causally (although not The first is to help foreground digital objects and call atten-
deterministically) in successive imbrications. While the tion to them as things worthy of investigation in their own
human and material agencies implicated at each stage may be right. In their seminal paper, Orlikowski and Iacono (2001,
transformed in their interactions, the emphasis is on a chrono- p. 130) describe this task, that of “making the implicit visible
logical to and fro between interacting agencies, rather than a and turning attention to the taken for granted,” as the principal
melding of the two. challenge in achieving a more thorough engagement with the
IT artifact. One of the main aims of ontological analysis is to
It is not our intention to criticize either perspective here or to meet this kind of challenge, which we sought to do by indi-
question the undoubted value of the empirical work they have viduating digital objects and their components analytically,
guided. Our aim instead is to suggest that one of the benefits and revealing their properties and ontological preconditions.
of our own theory is to provide a bridge between the two. In
our view, there is no contradiction between committing to a A second advantage is that, in providing a conception of
world full of discrete things with intrinsic properties while digital objects as structured ensembles of components that are
accepting that the emergence, social positioning, and, themselves objects, our theory provides the means to drill
accordingly, identities and system functions of such things down to whatever level any of their organizationally relevant
involve high degrees of relationality, performativity, and even properties might emanate from. We regard this as a crucial
something like localized intra-actions (e.g., the positioning, aspect of our theory because the organizational consequences
identity, and associated activities of MRI technician co- of technology often depend causally on, and therefore cannot
constituting the positioning and identity of MRI scanner, and be fully understood without reference to, such properties. So,
vice versa). To this extent, our account offers an alternative just as our understanding of how the gramophone turntable
for those attracted by the emphasis on relationality and became a musical instrument in the New York hip hop com-
performativity in sociomateriality but who nevertheless have munity in the late 1970s is deeper for knowing something
reservations about committing wholesale to intra-action tout about the properties of the Technics SL1200 turntables used
court and the “ontological fusion” (Orlikowski and Scott without which it would likely never have occurred—for ex-
2008, p. 456) of humans and technologies that this entails. At ample, the direct drive that made it possible to manipulate the
the same time, our account offers an alternative for those platter manually without damaging the device, and where the
attracted by the view of a world of at least temporarily stable motor had sufficient torque to bring the platter up to speed
things with intrinsic properties described in imbrication theory again quickly on being released (Faulkner and Runde 2009)—
and the role it ascribes to affordances (Gibson 1986; Hutchby so our understanding of the organizational consequences of
2001; Markus and Silver 2008; Norman 1990, 1999), but who something like blockchain technology might turn on knowing
may also be interested in a thoroughgoing account of the about the properties of (nonmaterial) data structures, crypto-
social positioning, social identity, and system functions of graphic keys, consensus mechanism protocols, and the many
digital objects, and the possibility of remaining open to a role elements of the material infrastructure required to maintain a
for at least some form of intra-action. geographically distributed ledger. Our theory provides a
framework within which such properties can be captured in a
systematic and, since it applies equally to material, non-
A Push to the Edge material, and hybrid objects, unified way.

Much of our theory is the product of an attempt to think A third advantage of our theory is that it captures important
through the ontology of digital objects from first principles specific features of digital objects, of which two in particular
and is to this extent an example of what Grover and Lyytinen stand out. The first is the nonmaterial nature of computer
(2015) call a “push to the edge,” away from middle-range files, a precondition for much of the digital world as we know
theorizing drawing on ideas imported from reference disci- it. We hope to have captured this property in a straight-
plines, toward a more abstract and unfettered “blue ocean” forward way that is consistent with how most engineers and
theorizing. One of the benefits of this kind of work is that it programmers on the ground think about it, and also dispels
avoids the imprecision or ambiguity that can arise when some of the apparent mystery reflected in descriptions of the
concepts intended for use in one domain are carried over to “dubious” (Allison et al. 2005) or “ambivalent” (Kallinikos et
another, such as where key properties of digital objects are al. 2013) ontology of bitstrings. The second feature is the
lost via their being equated with other forms of resources as object–bearer relationship and the capacity of bitstrings, and
they are understood in fields such as strategy or marketing. digital objects generally, to support multiple layers of bearers
But there are other advantages and we close by mentioning of a nonmaterial object. We see this part of our theory as an
four of them. addition to the literature on nonmaterial objects (Allison et al.

18 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

2005; Bhattacharjee et al. 2011; Ekbia 2009; Kallinikos et al. Our view on this issue is that, due to the presently over-
2010, 2013; Leonardi 2010; Matook and Brown 2017; Quah whelming preponderance of binary encoding and the bitstring,
2003; Rayna 2008) and as a potential source of building our framework will be able to accommodate most IT
blocks for further theorizing hybrid complexes ranging from innovations—ranging from continued advances in the design
relatively simple smart devices (Yoo 2010) to larger digital and manufacture of integrated circuits to seemingly more
infrastructures and ecosystems (Henfridsson and Bygstad radical changes such as the use of DNA as a new form of
2013; Tilson et al. 2010). material bearer (Church et al. 2012)—for the foreseeable
future. In some cases, however, it may well become neces-
The final advantage we want to mention is a key by-product sary to extend our theory in particular ways. For example, if
of our theory, namely that it offers an object-based definition something like ternary computing were to catch on, this
of “digital object” that is theoretically grounded in flowing would require recognizing the tritstring as a further basic non-
from a general conception of objecthood, able to account for material bearer, which would in turn require a generalization
why digital objects are specifically digital, and that covers of our notion of a digital object. And it is at least conceivable
both hardware and nonmaterial objects. This definition meets that new forms of computing will emerge in which the basic
the usual criteria of a sound definition in using predefined entities employed in the storage and manipulation of infor-
terms that are simpler than the term defined, and in giving an mation are quite different from those we have described. At
if-and-only-if condition for when an entity satisfies the defi- present, however, such developments seem some way off and,
nition. There are many ways in which definitions may be use- while it is interesting to speculate about how advances in
ful, ranging from providing points of departures for, guiding, areas such as quantum or biological computing may impact on
and lending rigor to empirical research, to contributing to the our theory, we trust that it is robust enough to remain of
project of providing distinctive foundations for the IS field as relevance for some time yet.
an independent discipline.10

Acknowledgments
Conclusion This paper is a distant descendant of a paper called “The Social, the
Material and the Ontology of Non-material Technological Objects”
Given their influence on organizations and organizing that has been circulating on the Internet for many years (Faulkner
processes, there is a pressing need for more sophisticated and Runde 2010). We would like to thank the following people for
understanding of digital objects. We have sought to respond their input to the many subsequent versions that culminated in this
to this need by articulating a theory of such objects that does one: the senior editor, associate editor, and anonymous referees of
justice both to their inherent properties and to their social this journal; Aleksi Aaltonen, Michael Burcher, Tom Carrell, John
Clarke, Ola Henfridsson, Matthew Jones, Jannis Kallinikos, Clive
aspects. In the process, however, we largely bypassed recent
Lawson, Tony Lawson, Paul Leonardi, Kamal Munir, Bonni Nardi,
debates in IS about the nature and role of theory, debates that Katherine Rock, Mark Thompson, Georg von Krogh, Youngjin Yoo,
reflect a considerable variation in views on what counts as and, especially, Wanda Orlikowski whose work first led us into this
theory, how it should be used, and how much emphasis fascinating area.
should be put on it (e.g., Alter 2015, 2017; Avison and
Malaurent 2014; Grover and Lyytinen 2015; Markus 2014;
Silverman 2014). While this is not the place to enter these References
debates, we close by noting Alter’s (2015) concern about the
rapid pace of technological change undermining the long-term Aggarwal, R., Gopal, R., Sankaranarayanan, R., and Singh, P. V.
value of theorizing in IS and the questions this raises about 2012. “Blog, Blogger, and the Firm: Can Negative Employee
Posts Lead to Positive Outcomes?,” Information Systems
whether and to what extent future developments in computing
Research (23:2), pp. 306-322.
might render our theory obsolete. Akaka, M. A., and Vargo, S. L. 2014. “Technology as an Operant
Resource in Service (Eco)Systems,” Information Systems and
e-Business Management (12:3), pp. 367-384.
10
The debate Orlikowski and Iacono precipitated about the identity of the IS Akaka, M. A., Vargo, S. L., and Lusch, R. F. 2013. “The Com-
field and whether the IT artifact was core to this (King and Lyytinen 2006), plexity of Context: A Service Ecosystems Approach for
was fueled by concerns at the time about the future of IS as an independent
International Marketing,” Journal of International Marketing
discipline (Benbasat and Zmud 2003; Weber 2003). While these concerns
have since waned (Baskerville 2012, p. 587), the associated boundary issues
(21:4), pp. 1-20.
have never fully gone away and therefore neither have questions about how Akerlof, G. 1970. “The Market for ‘Lemons’: Quality Uncertainty
digital objects, IT artifacts, and so on should be defined (Akhlaghour et al. and the Market Mechanism,” The Quarterly Journal of Econo-
2013, p. 155). mics (84:3), pp. 488-500.

MIS Quarterly Vol. 43 No. 4/December 2019 19


Faulkner & Runde/Theorizing the Digital Object

Akhlaghpour, S., Wu, J., Lapointe, L., and Pinsonneault, A. 2013. Boudreau, K. 2012. “Let a Thousand Flowers Bloom? An Early
“The Ongoing Quest for the IT Artifact: Looking Back, Moving Look at Large Numbers of Software Apps Developers and
Forward,” Journal of Information Technology (28:2), pp. Patterns of Innovation,” Organization Science (23:5), pp.
150-166. 1409-1427.
Alavi, M., and Leidner, D. 2001. “Knowledge Management and Brynjolfsson, E., and McAfee, A. 2012. Race Against the Machine,
Knowledge Management Systems: Conceptual Foundations and Digital Frontier Press.
Research Issues,” MIS Quarterly (25:1), pp. 107-136. Cardinale, I., and Runde, J. 2019. “Technology and Human Prac-
Allison, A., Currall, J., Moss, M., and Stuart, S. 2005. “Digital tices: Beyond Enabling and Constraining,” unpublished manu-
Identity Matters,” Journal of the American Society for Infor- script, University of Cambridge.
mation Science and Technology (56:4), pp. 364-372. Cecez-Kecmanovic, D., Galliers, R. D., Henfridsson, O., Newell, S.,
Alter, S. 2015. “Five Seemingly Insurmountable Challenges and Vidgen, R. 2014. “The Sociomateriality of Information
Related to Attaining Long-Term Value from Theorizing about Systems: Current Status, Future Directions,” MIS Quarterly
Information Systems,” SIG-PHIL Workshop at the 2015 Interna- (38:3), pp. 809-830.
tional Conference on Information Systems, Fort Worth, TX. Chau, M., and Xu, J. 2012. “Business Intelligence in Blogs:
Alter, S. 2017. “Nothing Is More Practical than a Good Conceptual Understanding Consumer Interactions and Communities,” MIS
Artifact … Which May Be a Theory, Framework, Model, Quarterly, (36:4) pp.1189-1216.
Metaphor, Paradigm or Perhaps Some Other Abstraction,” Cheikh-Ammar, M. 2018. “The IT Artifact and its Spirit: A Nexus
Information Systems Journal (27:5), pp. 671-693. of Human Values, Affordances, Symbolic Expressions, and IT
Atasoy, O., and Morewedge, C. 2018. “Digital Goods Are Valued Features,” European Journal of Information Systems (27:3), pp.
Less Than Physical Goods,” Journal of Consumer Research (44: 278-294.
6), pp. 1343-1357. Chen, Y., Wang, Y., Nevo, S., Jin, J., Wang, L., and Chow, W. S.
Ayanso, A., Lertwachara, K., and Vachon, F. 2007. “Diversity or 2014. “IT Capability and Organizational Performance: The
Identity Crisis? An Examination of Leading IS Journals,” Roles of Business Process Agility and Environmental Factors,”
Communications of AIS (20), pp. 660-680. European Journal of Information Systems (23:3), pp. 326-342.
Avison, D., and Malaurent, J. 2014. “Is Theory King? Questioning Choi, S. 2018. “Organizational Knowledge and Information Tech-
the theory fetish in information systems,” Journal of Information nology: the Key Resources for Improving Customer Service in
Technology (29:4), pp. 327-336. Call Centers,” Information Systems and e-Business Management
Barad, K. 2007. Meeting the Universe Halfway: Quantum Physics (16:1), pp. 187-203.
and the Entanglement of Matter and Meaning, Durham, NC: Choi, S., and Ryu, I. 2015. “Leveraging Accumulated Customer
Duke University Press. Knowledge in Electronic Knowledge Repositories for Superior
Barley, S. R., Meyerson, D. E., and Grodal, S. 2011. “E-Mail as a Customer Service,” Asia Pacific Journal of Information Systems
Source and Symbol of Stress,” Organization Science (22:4), pp. (25:3), pp. 519-539.
887-906. Chuang, S-H., and Lin, H-N. 2017. “Performance Implications of
Barnatt, C. 2013. “3D Printing: The Next Industrial Revolution,” Information-Value Offering in e-Service Systems: Examining
ExplainingTheFuture.Com. the Resource-Based Perspective and Innovation Strategy,”
Barney, J. B. 1991. “Firm Resources and Sustained Competitive Journal of Strategic Information Systems (26:1), pp. 22-38.
Advantage,” Journal of Management (17:1), pp. 99-120. Church, G., Gao, Y., and Kosuri, S. 2012. “Next-Generation
Barney, J. B., and Clark, D. N. 2007. Resource-Based Theory: Digital Information Storage in DNA,” Science (337:6102), p.
Creating and Sustaining Competitive Advantage, Oxford, UK: 1628.
Oxford University Press. Claussen, J., Kretschmer, T., and Mayrhofer, P. 2013. “The Effects
Barrett, M., Davidson, E., Prabhu, J., and Vargo, S. L. 2015. of Rewarding User Engagement: The Case of Facebook Apps,”
“Service Innovation in the Digital Age: Key Contributions and Information Systems Research (24:1), pp. 186-200.
Future Directions,” MIS Quarterly (39:1), pp. 135-154. Crooks, K. 2015. “From Vinyl to Digital—The Second Hand
Baskerville, R. 2012. “Reviving the IT in the IS,” European Jour- Digital Music Market and Implications for Copyright,” Shelston
nal of Information Systems (21:6), pp. 587-591. Intellectual Property, January 30.
Benbasat, I., and Zmud, R. W. 2003. “The Identity Crisis Within Dierickx, I., and Cool, K. 1989. “Asset Stock Accumulation and
the Is Discipline: Defining and Communicating the Discipline’s Sustainability of Competitive Advantage,” Management Science
Core Properties,” MIS Quarterly (27:2), pp. 183-194. (35:11), pp. 1504-11.
Belk, R. W. 2013. “Extended Self in a Digital World,” Journal of Drnevich, P., and Croson, D. 2013. “Information Technology and
Consumer Research (40:3), pp. 477-500. Business-Level Strategy: Toward an Integrated Theoretical
Bharadwaj, A. S. 2000. “A Resource-Based Perspective on Infor- Perspective,” MIS Quarterly (37:2), pp. 483-509.
mation Technology Capability and Firm Performance: An Empi- Eaton, B., Elaluf-Calderwood, S., Sørensen, C., and Yoo, Y. 2015.
rical Investigation,” MIS Quarterly (24:1), pp. 169-196. “Distributed Tuning of Boundary Resources: The Case of
Bhattacharjee, S., Gopal, R., Marsden, J., and Sankaranarayanan, R. Apple’s iOS Service System,” MIS Quarterly (39:1), pp.
2011. “Digital Goods and Markets: Emerging Issues and Chal- 217-243.
lenges,” ACM Transactions on Management Information Systems Ekbia, H. R. 2009. “Digital Artifacts as Quasi-Objects: Qualifica-
(2:2), Article No. 8. tion, Mediation, and Materiality,” Journal of the American

20 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

Society for Information Science and Technology (60:12), pp. Kallinikos, J., Aaltonen, A., and Marton, A. 2013. “The Ambi-
2554-2566. valent Ontology of Digital Artifacts,” MIS Quarterly (37:2), pp.
Faulkner, P., Pratten, S., and Runde, J. 2017. “Cambridge Social 357-370.
Ontology: Clarification, Development and Deployment,” Cam- Kallinikos, J., and Mariátegui J.-C. 2011. “Video as Digital Object:
bridge Journal of Economics (41:5), pp. 1265-1277. Production and Distribution of Video Content in the Internet
Faulkner, P., and Runde, J. 2009. “On the Identity of Technolo- Media Ecosystem,” The Information Society (27:4), pp. 281-294.
gical Objects and User Innovations in Function,” Academy of Kaplan, J. 2015. Humans Need Not Apply: A Guide to Wealth and
Management Review (34:3), pp. 442-462. Work in the Age of Artificial Intelligence, New Haven, CT: Yale
Faulkner, P., and Runde, J. 2010. “The Social, the Material and the University Press.
Ontology of Non-material Technological Objects,” unpublished King, J., and Lyytinen, K. 2006. Information Systems: The State
manuscript, University of Cambridge. of the Field, Chichester, UK: John Wiley & Sons.
Faulkner, P., and Runde, J. 2013. “Technological Objects, Social Kohli, R., and Tan, S. 2016. “Electronic Health Records: How Can
Positions and the Transformational Model of Social Activity,” IS Researchers Contribute to Transforming Healthcare?,” MIS
MIS Quarterly (37:3), pp. 803-818. Quarterly (40:3) pp. 553-572.
Ford, M. 2015. The Rise of the Robots: Technology and the Threat Kyriakou, H., Nickerson, J., and Sabnis, G. 2017. “Knowledge
of Mass Unemployment, London: Oneworld Publications. Reuse for Customization: Metamodels in an Open Design
Gibson, J. J. 1986. The Ecological Approach to Visual Perception, Community for 3D Printing,” MIS Quarterly (41:1) pp. 315-332.
Hillsdale, NJ: Lawrence Erlbaum Associates. Lando, P., Lapujade, A., Kassel, G., and Fürst, F. 2008. “An
Giles, D. C., Pietrzykowski, S., and Clark, K. E. 2007. “The Ontological Investigation in the Field of Computer Programs,” in
Psychological Meaning of Personal Record Collections and the Software and Data Technologies, J. Filipe, B. Shishkov,
Impact of Changing Technological Forms,” Journal of Economic M. Helfert, and L. Maciaszek (eds.), Heidelberg, Germany:
Psychology (28:4), pp. 429-43. Springer, pp. 371-386.
Grant, R. M. 1996. “Toward a Knowledge-Based Theory of the Lawson, T. 1997. Economics and Reality, London: Routledge.
Firm,” Strategic Management Journal (17:Winter Special Issue), Lawson, T. 2003. Reorienting Economics, London: Routledge.
pp. 109-122. Lawson, T. 2012. “Ontology and the Study of Social Reality:
Grover, V., and Lyytinen, K. 2015. “New State of Play in Emergence, Organisation, Community, Power, Social Relations,
Information Systems Research: The Push to the Edges,’ MIS Corporations, Artifacts and Money,” Cambridge Journal of
Quarterly (39:2), pp. 271-296. Economics (36:2), pp. 345-385.
Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M. 2013. Lawson, T. 2015. “A Conception of Social Ontology,” in Social
“Internet of Things (IoT): A Vision, Architectural Elements, and Ontology and Modern Economics, S. Pratten (ed.), Oxford, UK:
Future Directions,” Future Generation Computer Systems (29:7), Routledge, pp. 19-52.
pp. 1645-1660. Lawson, T. 2016. “Social Positioning and the Nature of Money,”
Hamilton, D. 2015. “It’s My Copy and I’ll Sell It If I Want To: Cambridge Journal of Economics (40:4), pp. 961-996.
Capitol Records, LLC v. ReDigi Inc,” Journal of the Patent and Leonardi, P. M. 2010. “Digital Materiality? How Artifacts
Trademark Office Society (97), pp. 232-255. Without Matter, Matter,” First Monday (15:6).
Henfridsson, O., and Bygstad, B. 2013. “The Generative Mech- Leonardi, P. M. 2011. “When Flexible Routines Meet Flexible
anisms for Digital Infrastructure Evolution,” MIS Quarterly Rechnologies: Affordance, Constraint, and the Imbrication of
(37:3), pp. 907-931. Human and Material Agencies,” MIS Quarterly (35:1), pp.
Hibbeln, M., Jenkins, J. L., Schneider, C., Valacich, J. S., and 147-167.
Weinmann, M. 2017. “How Is Your User Feeling? Inferring Leonardi, P. M. 2012. Car Crashes Without Cars: Lessons about
Emotion Though Human–Computer Interaction Devices,” MIS Simulation Technology and Organizational Change from
Quarterly (41:1), pp. 1-21. Automotive Design, Cambridge, MA: MIT Press.
Hoehle, H., and Venkatesh, V. 2015. “Mobile Application Leonardi, P. M. 2013. “Theoretical Foundations for the Study of
Usability: Conceptualization and Instrument Development,” MIS Sociomateriality,” Information and Organization (23:2), pp.
Quarterly (39:2), pp.435-472. 59-76.
Huguenin-Love, J. 2014. “Song on Wire: A Technical Analysis of Leonardi, P. M. 2017. “Methodological Guidelines for the Study
ReDigi and the Pre-owned Digital Media Marketplace,” Journal of Materiality and Affordances,” in Routledge Companion to
of Intellectual Property and Entertainment Law (4:1), pp. 1-35. Qualitative Research in Organization Studies, M. Raza and
Hutchby, I. 2001. “Technologies, Texts and Affordances,” S. Jain (eds), New York: Routledge, pp. 279-290.
Sociology (35:2), pp. 441-456. Leonardi, P. M., Nardi, B. A., and Kallinikos, J. (eds.). 2012.
Jones, M. 2014. “A Matter of Life and Death: Exploring Concep- Materiality and Organizing Social Interaction in a Technological
tualizations of Sociomateriality in the Context of Critical Care,” World, Oxford, UK: Oxford University Press.
MIS Quarterly (38:3), pp. 895-925. Leonardi, P. M., and Rodriguez-Lluesma, C. 2012. “Sociomateri-
Kallinikos, J., Aaltonen, A., and Marton, A. 2010. “A Theory of ality as a Lens for Design: Imbrication and the Constitution of
Digital Objects,” First Monday (15:6) (http://firstmonday.org/ Technology and Organization,” Scandinavian Journal of
htbin/cgiwrap/bin/ojs/index.php/fm/ article/view/3033/2564). Information Systems (24:2), pp. 79-88.

MIS Quarterly Vol. 43 No. 4/December 2019 21


Faulkner & Runde/Theorizing the Digital Object

Liebeskind, J. P. 1996. “Knowledge, Strategy and the Theory of Norman, D. A. 1990. The Design of Everyday Things, New York:
the Firm,” Strategic Management Journal (17:Winter Special Doubleday.
Issue), pp. 93-107. Norman, D. A. 1999. “Affordance, Conventions, and Design,”
Lipson, H., and Kurman, M. 2013. Fabricated: The New World of Interactions (6:3), pp. 38-43.
3D Printing, Indianapolis, IN: John Wiley & Sons. Orlikowski, W. J. 2007. “Sociomaterial Practices: Exploring
Luo, X., Gu, B., Zhang, J., and Phang, C. W. 2017. “Expert Blogs Technology at Work,” Organization Studies (28:9), pp. 1435-48.
and Consumer Perceptions of Competing Brands,” MIS Quarterly Orlikowski, W. J. 2010. “The Sociomateriality of Organizational
(41:2), pp.371-395. Life: Considering Technology in Management Research,”
Lusch, R. F., and Nambisan, S. 2015. “Service Innovation: A Cambridge Journal of Economics (34:1), pp. 125-41.
Service-Dominant Logic Perspective,” MIS Quarterly (39:1), pp. Orlikowski, W. J., and Iacono, C. S. 2001. “Research Commen-
155-175. tary: Desperately Seeking the ‘IT’ in IT research: A Call to
Lusch, R. F., and Vargo, S. L. 2014. Service-Dominant Logic: Theorizing the IT Artifact,” Information Systems Research
Premises, Perspectives, Possibilities, Cambridge, UK: Cam- (12:2), pp. 121-134.
bridge University Press. Orlikowski, W. J., and Scott, S. V. 2008. “Sociomateriality:
Lusch, R. F., Vargo, S. L., and Tanniru, M. 2010. “Service, Value Challenging the Separation of Technology, Work and Organi-
Networks and Learning,” Journal of the Academy of Marketing zation,” Academy of Management Annals (2), pp. 433-474.
Science (38:1), pp. 19-31. Orlikowski, W. J., and Scott, S. V. 2014. “What Happens When
Mao, H., Liu, S., and Zhang, J. 2015. “How the Effects of IT and Evaluation Goes Online?,” Organization Science (25:3), pp.
Knowledge Capability on Organizational Agility Are Contingent 868-891.
on Environmental Uncertainty and Information Intensity,” Orlikowski, W. J., and Scott, S. V. 2015. “The Algorithm and the
Information Development (31:4), pp. 358-382. Crowd: Considering the Materiality of Service Innovation,” MIS
Markus, M. L. 2014. “Maybe Not the King, but an Invaluable Quarterly (39:1), pp. 201-216.
Subordinate: a Commentary on Avison and Malaurent’s Advo- Pavlou, P., Housel, T., Rodgers, W., and Jansen, E. 2005.
cacy of ‘Theory Light’ IS Research,” Journal of Information “Measuring the Return on Information Technology: A
Technology (29:4), pp.341-345. Knowledge-Based Approach for Revenue Allocation at the
Process and Firm Level,” Journal of the Association for
Markus, M. L., and Silver, M. S. 2008. “A Foundation for the
Information Systems (6:7), pp. 199-226.
Study of IT Effects: A New Look at DeSanctis and Poole’s
Petrelli, D., and Whittaker. S. 2010. “Family Memories in the
Concepts of Structural Features and Spirit,” Journal of the
Home: Contrasting Physical and Digital Mementos,” Personal
Association for Information Systems (9:10), pp. 609-632.
and Ubiquitous Computing (14:2), pp. 153-69.
Mata, F. J., Fuerst, W. L., and Barney, J. B. 1995. “Information
Poole, D. L., and Mackworth, A. K. 2010. Artificial Intelligence:
Technology and Sustained Competitive Advantage: A Resource-
Foundations of Computational Agents, Cambridge, UK:
Based Analysis,” MIS Quarterly (19:4), pp. 487-505.
Cambridge University Press.
Matook, S., and Brown, S. 2017. “Characteristics of IT Artifacts:
Prasopoulou, E. 2017. “A Half-Moon on My Skin: A Memoir on
A Systems Thinking-Based Framework for Delineating and
Life with an Activity Tracker,” European Journal of Information
Theorizing IT Artifacts,” Information Systems Journal (27:3), pp.
Systems (26:3), pp. 287-297.
309-346.
Quah, D. 2003. “Digital Goods and the New Economy,” in New
Melville, N., Kramer, K., and Gurbaxani, V. 2004. “Review: Economy Handbook, D. Jones (ed.), San Diego, CA: Academic
Information Technology and Organizational Performance: An Press, pp. 289-321.
Integrative Model of IT Business Value,” MIS Quarterly (28:2), Ravichandran, T., Lertwongsatien, C., and Lertwongsatien, C.
pp. 283-322. 2005. “Effect of Information Systems Resources and Capa-
Miorandi, D., Sicari, S., De Pellegrini, F., and Chlamtac, I. 2012. bilities on Firm Performance: A Resource-Based Perspective,”
“Internet of Things: Vision, Applications and Research Chal- Journal of Management Information Systems (4:4), pp. 237-276.
lenges,” Ad Hoc Networks (10:7), pp. 1497-1516. Ray, G., Muhanna, W. A., and Barney, J. B. 2005. “Information
Mithas, S., Tafti, A., Bardhan, I., and Goh, J. 2012. “Information Technology and the Performance of the Customer Service
Technology and Firm Profitability: Mechanisms and Empirical Process: A Resource-Based Analysis,” MIS Quarterly (29:4), pp.
Evidence,” MIS Quarterly (36:1), pp. 205-224. 625-652.
Nambisan, S. 2013. “Information Technology and Product/Service Rayna, T. 2008. “Understanding the Challenges of the Digital
Innovation: A Brief Assessment and Some Suggestions for Economy: The Nature of Digital Goods,” Communications and
Future Research,” Journal of the Association for Information Strategies (71:3), pp. 13-36.
Systems (14:4), pp. 215-226. Reychav, I., and Weisberg, J. 2009. “Going Beyond Technology:
Nevo, S., and Wade, M. R. 2010. “The Formation and Value of IT- Knowledge Sharing as a Tool for Enhancing Customer-Oriented
Enabled Resources: Antecedents and Consequences of Syner- Attitudes,” International Journal of Information Management
gistic Relationships,” MIS Quarterly (34:1), pp. 163-183. (29:5), pp. 353-361.
Nonaka, I., and Takeuchi, H. 1995. The Knowledge-Creating Riemer, K., and Johnston, R. B. 2017. “Clarifying Ontological
Company: How Japanese Companies Create the Dynamics of Inseparability with Heidegger’s Analysis of Equipment,” MIS
Innovation, New York: Oxford University Press. Quarterly (41:4) pp.1059-1081.

22 MIS Quarterly Vol. 43 No. 4/December 2019


Faulkner & Runde/Theorizing the Digital Object

Santhanam, R., and Hartono, E. 2003. “Issues in Linking Informa- Tanriverdi, H. 2005. “Information Technology Relatedness,
tion Technology Capability to Firm Performance,” MIS Quarterly Knowledge Management Capability, and Performance of Multi-
(27:1), pp. 125-153. business Firms,” MIS Quarterly (29:2) pp. 311-334.
Scherer, A., Wünderlich, N. V., and von Wangenheim, F. 2015. Tilson, D., Lyytinen, K., and Sorensen, C. 2010. “Digital Infra-
“The Value of Self-Service: Long-Term Effects of Technology- structures: The Missing IS Research Agenda,” Information
Based Self-Service Usage on Customer Retention,” MIS Quar- Systems Research (21:4), pp. 748-759.
terly (39:1), pp. 177-200. Vargo, S. L., and Akaka, M. A. 2012. “Value Cocreation and
Scott, S., and Orlikowski, W. 2014. “Entanglements in Practice: Service Systems (Re)Formation: A Service Ecosystems View,”
Performing Anonymity Through Social Media,” MIS Quarterly Service Science (4:3), pp. 207-217.
(38:3), pp. 873-895. Vargo, S. L., and Lusch, R. F. 2004. “Evolving to a New Dominant
Serra, T. 2013. “Rebalancing at Resale: Redigi, Royalties, and the Logic for Marketing,” Journal of Marketing (68:1), pp. 1-17.
Digital Secondary Market,” Boston University Law Review (93), Vargo, S. L., and Lusch, R. F. 2008a. “Service-Dominant Logic:
pp. 1753-1808. Continuing the Evolution,” Journal of the Academy of Marketing
Setia, P., Venkatesh, V., and Joglekar, S. 2013. “Leveraging Digi- Science (36:1), pp. 1-10.
tal Technologies: How Information Quality Leads to Localized Vargo, S. L., and Lusch, R. F. 2008b. “A Service Logic for Service
Capabilities and Customer Service Performance,” MIS Quarterly Science,” in Service Science, Management and Engineering
(37:2), pp. 565-590. Education for the 21st Century, B. Hefley and W. Murphy (eds.),
Silver, M. S., and Markus, M. L. 2013. “Conceptualizing the Berlin: Springer, pp. 83-88.
SocioTechnical (ST) Artifact,” Systems, Signs & Actions (7:1), Vargo, S. L., and Lusch, R. F. 2011. “It’s All B2B and Beyond …
pp. 82-89.
Toward a Systems Perspective of the Market,” Industrial
Silverman, D. 2014. “Taking Theory Too Far? A Commentary on
Marketing Management (40:2), pp. 181-187.
Avison and Malaurent,” journal of Information Technology
Vargo, S. L., and Lusch, R. F. 2016. “Institutions and Axioms: an
(29:4), pp.353-355.
Extension and Update of Service-Dominant Logic,” Journal of
Soma, J., and Kugler, M. 2014. “Why Rent When You Can Own:
the Academy of Marketing Science (44:1), pp. 5-23.
How ReDigi, Apple, and Amazon Will Use the Cloud and the
Vargo, S. L., Maglio, P. P., and Akaka, M. A. 2008. “On Value and
Digital First Sale Doctrine to Resell Music, E-Books, Games, and
Value Co-creation: A Service Systems and Service Logic Per-
Movies,” North Carolina Journal of Law & Technology (15:3),
spective,” European Management Journal (26), pp. 145-152.
pp. 425-462.
Wade, M., and Hulland, J. 2004. “Review: The Resource-Based
Spender, J.-C. 1989. Industry Recipes: The Nature and Sources of
View and Information Systems Research: Review, Extension,
Managerial Judgment, Oxford, UK: Blackwell.
Spender, J.-C. 1996. “Making Knowledge the Basis of a Dynamic and Suggestions for Future Research,” MIS Quarterly (28:1), pp.
Theory of the Firm,” Strategic Management Journal (17:Winter), 107-142.
pp. 45-62. Wang, J., Li, Y., and Rao, H. R. 2016. “Overconfidence in
Sriviastava, S. C., and Shainesh, G. 2015. “Bridging the Service Phishing Email Detection,” Journal of the Association for
Divide Through Digitally Enabled Service Innovations: Evi- Information Systems (17:11), pp. 759-783.
dence from Indian Healthcare Service Providers,” MIS Quarterly Weber, R. 2003. “Still Desperately Seeking the IT Artifact,” MIS
(39:1), pp. 245-267. Quarterly (27:2), pp. 3-11.
Stoel, M., and Muhanna, W. 2009. “IT Capabilities and Firm Wernerfelt, B. 1984. “A Resource-Based View of the Firm,”
Performance: a Contingency Analysis of the Role of Industry Strategic Management Journal (5:2), pp. 171-180.
and Capability Type,” Information & Management (46:3), pp. Xu, J., Abdinnour, S., and Chaparro, B. 2017. “An Integrated
181-189. Temporal Model of Belief and Attitude Change: An Empirical
Streitfeld, D. 2013. “Imagining a Swap Meet for E-Books and Test with the iPad,” Journal of the Association for Information
Music,” The New York Times, March 3 (https://www.nytimes. Systems (18:2), pp. 113-140.
com/2013/03/08/technology/revolution-in-the-resale-of-digital- Yoo, Y. 2010. “Computing in Everyday Life: A Call for Research
books-and-music.html; accessed September 10, 2018). on Experimental Computing,” MIS Quarterly (34:2), pp.
Strong, D., and Volkoff, O. 2010. “Understanding Organization- 213-231.
Enterprise System Fit: A Path to Theorizing the Information Yoo, Y., Henfridsson, O., and Lyytinen, K. 2010. “Research
Technology Artifact,” MIS Quarterly, (34:4) pp.731-756. Commentary: The New Organizing Logic of Digital Innovation:
Susarla, A., Oh, J. H., and Tan, Y. (2012). “Social Networks and An Agenda for Information Systems Research,” Information
the Diffusion of User-Generated Content: Evidence from Systems Research (21:4), pp. 724-735.
YouTube,” Information Systems Research (23:1), pp. 23-41. Zammuto, R. F., Griffith, T. L., Majchrzak, A., Dougherty, D. J.,
Sykes, T. A. 2015. “Support Structures and Their Impacts on and Faraj, S. 2007. “Information Technology and the Changing
Employee Outcomes: A Longitudinal Field Study of an Enter- Fabric of Organization,” Organization Science (18:5), pp.
prise System Implementation,” MIS Quarterly (39:2) pp. 749-642.
473-495.

MIS Quarterly Vol. 43 No. 4/December 2019 23


Faulkner & Runde/Theorizing the Digital Object

About the Authors Jochen Runde is Professor of Economics & Organisation and
Faculty Dean at Cambridge Judge Business School, and Professorial
Philip Faulkner is Reddaway Fellow, Director of Studies and Fellow and Director of Studies in Management at Girton College,
Senior College Teaching Officer in Economics, at Clare College, Cambridge. He is co-editor of the Cambridge Journal of
Cambridge, and a Fellow of Cambridge Judge Business School. His Economics, an Associate of the Cambridge Social Ontology Group,
research focuses on issues in social ontology, primarily the nature of and his main areas of research are the ontology of technology,
technology, and decision making under extreme uncertainty, and he decision making under extreme uncertainty, and explanation in the
has published on these and other topics in journals including social sciences.
Academy of Management Review and MIS Quarterly. He presently
serves as co-editor of the Cambridge Journal of Economics.

24 MIS Quarterly Vol. 43 No. 4/December 2019


Copyright of MIS Quarterly is the property of MIS Quarterly and its content may not be
copied or emailed to multiple sites or posted to a listserv without the copyright holder's
express written permission. However, users may print, download, or email articles for
individual use.

You might also like