You are on page 1of 22

Editorial

Journal of Information Technology


2023, Vol. 38(2) 86–107
The regulation of and through information © Association for Information
Technology Trust 2023
technology: Towards a conceptual ontology Article reuse guidelines:
sagepub.com/journals-permissions
DOI: 10.1177/02683962231181147
for IS research Journals.sagepub.com/jinf

Tom Butler1, Daniel Gozman2  and Kalle Lyytinen3

Abstract
This special issue addresses a largely neglected area of Information Systems (IS) research – the regulation of and through
Information Technology (IT). As with other human technologies, IT artefacts present risks and can harm individuals, groups,
organisations, economies, and society: However, this remains a largely unexplored topic in IS research. Nevertheless,
regulators, social commentators, the media, and the public have voiced their concerns about such risks, particularly those
related to artificial intelligence (AI), cybersecurity, privacy, digital assets (e.g. cryptocurrencies), and the market dominance
of digital platforms. Accordingly, regulations have been instituted or proposed to regulate IT artefacts in and across several
business sectors. Additionally, in response to the informational challenges posed by a complex web of laws and regulations,
regulators and business organisations have implemented IT artefacts to transform regulatory and supervisory processes or
to enhance organisational risk management and compliance reporting capabilities. This special issue addresses the research
challenges related to emergent issues surrounding the regulation of and through IT. In this editorial, we take stock of where
the field currently stands. We advance a conceptual ontology of IT regulation to guide future research by specifying several
taken-for-granted core concepts. By rendering the concepts, categories, and their relationships explicit, the model and its
related research questions provide a firm foundation to generate a cumulative body of research on the regulation of and
through IT.

Keywords
Information technology, information systems, regulations, risk, compliance, ontology

Introduction relationships between digital technologies, their uses, and


risks.
Innovative digital technologies are commonly promoted The regulation – IT artefact – risk nexus has, with a few
with the promise of significant rewards for individuals, exceptions (cf. Bamberger, 2009; Butler, 2011, 2012, 2017;
organisations, and society. However, experience and re- Butler and McGovern, 2012; Butler and O’Brien, 2019;
search indicate that innovations have a dark side (Tarafdar, Clarke, 2022; Clemons and Wilson, 2018; Currie, Gozman
Gupta, and Turel, 2013). Generally, IT artefacts and their and Seddon, 2018; de Vaujany et al., 2018; Gozman and
multifaceted, growing combinations and layering into Currie 2019; 2014; Gozman et al., 2020; Gozman and
platforms and digital infrastructures come with negative Willcocks, 2019), eluded the focus of a majority of IS
affordances (Scarantino, 2003; Mikalef et al., 2022), car-
rying significant risks to organisational stakeholders
1
(Ciborra, 2006) and society (World Economic Forum, Depratment of Business Information Systems, University College Cork,
Cork City, Ireland
2022). While such unintended negative uses are exten- 2
University of Sydney Business School, University of Sydney Business
sive and commonplace (Kirby, 2009; Parent and Reich, School, Sydney, NSW, AU
2009; Paech et al., 2019), and their effects have become 3
Case Western Reserve University Weatherhead School of Management,
pervasive and essential at the systemic level, there is little Cleveland, Ohio, USA
research on such effects and ways to cope with them. Since
Corresponding author:
Ciborra’s (2006 p. 1339) call ‘to characterize the multiple Daniel Gozman, The University of Sydney Business School, University of
links between risk and digital technologies in organiza- Sydney, NSW 2006, AU.
tions’, IS researchers failed to focus systematically on Email: daniel.gozman@sydney.edu.au
Butler et al. 87

scholars. At the same time, and often despite such neglect, across organisational fields concerned with the regulation of
regulators have grown increasingly concerned about the IT; (2) understand institutional responses to regulatory
threats, hazards, and vulnerabilities of IT artefacts and the principles and rules in terms of the design, development,
downside risks they pose (Bosschaerts and Lio, 2022; implementation and use of compliant IT artefacts, digital
Butler and Brooks, 2021; Wessel, 2019; Kosseff, 2019). For infrastructures and platforms through which regulatory
example, while the use of IT artefacts in the pharmaceutical compliance is performed – this informs institutional and
and healthcare industries has been well-regulated due to organisational responses for addressing regulation through
concern for health and population risks, the uses of IT IT; and (3) comprehend frontline regulatory actions in-
systems continue to threaten the integrity of processes and volving the application of IT artefacts and digital infra-
products across related sectors (Dickson, 2003; Papp, 2006; structures for the supervision, compliance management, and
Theisen and Neill, 2004; Shuren, Patel, and Gottlieb, 2018). risk assessment of regulated entities – the supervisory di-
In other industries, the regulation of IT artefacts and their mension of regulation through IT. The final section offers
uses can be traced to the introduction of the Sarbanes-Oxley concluding observations and direction while challenging IS
Act (SOX) (Parent and Reich, 2009). Recently, as this researchers to address the risk IT artefacts pose to society.
special issue demonstrates, the growing dominance of
digital platforms has given birth to novel risks which am-
plify the negative affordances of IT artefacts across most Regulation and digital innovation: From
industries and society. Another area of concern highlighted applications to digital infrastructures,
in this special issue is the reliance on complex national and
global digital infrastructures (DI) which pose novel risks to
algorithms to digital platforms
individuals, markets, and societies (Gleiss et al.,2023; We received 31 papers, of which six will be published in this
Henningsson and Eaton, 2023; Karanasios et al., 2023; special issue.1 Overall, the papers were heterogenous in
Lindman et al., 2023; Schnurr et al., 2023). topics, methods, and theoretical frames. This heterogeneity
One reason for this lacuna in IS research is that the is also reflected in the accepted six articles summarised in
regulation-IT artefact – risk nexus is a complex and dynamic Table 1, which reports for each article the IT artefact being
social phenomenon which evades the typical IT scholar’s regulated and the regulatory goal (of or through), the level of
focus on the positive, static intended consequences of IT regulatory intervention, the theoretical approach, and the
artefacts on specific stakeholders such as users, managers, research design. We next present and review the papers’
or consumers. Thus, IS researchers generally fail to in- contributions and offer some observations of their
vestigate (1) digital technology risks and effects, which lie significance.
at the root of the call for the regulation of IT – this is the The first paper, ‘Investigating IT-based Regulation of
first theme of the special issue – and (2) the use of digital Personal Health: Nudging, Mobile Health Apps and Per-
technologies to identify and mitigate risks through regu- sonal Health Data’ studies micro-level regulation through
latory compliance imposed by various regulators based on an IT artefact implemented as a smartphone app (Davidson
diligent assessments of the risks that IT poses to individuals, et al.,2023). In the context of this study, the concept of self-
organisations, and society – thus, regulation through IT is regulation involves an individual’s compliance with norms
the second theme of this special issue. and standards related to health-preserving behaviours that
The six articles included in this special issue and some to are induced using a health app on a smartphone. The app
follow in regular issues offer a significant starting point for gathers data on chronic illness conditions (diabetes) and
future research in the area. The Regulation and digital diagnostic and personal data for individual behaviour
innovation: From applications to digital infrastructures, monitoring towards better health outcomes. The authors
algorithms to digital platforms, therefore, synthesises the note the tension between the public socio-economic goal of
six contributions and their findings. However, this growing minimising an individual’s health risks and new demands on
stream of research needs to be integrated into a research and risks related to new healthcare services which uses
framework to enable a cumulative research program. individual health data for behavioural control. This raises
Without such an integrated program, research will remain the need to protect individual privacy while at the same time
disconnected and siloed. Therefore, The Towards an On- encouraging innovation in healthcare services. The authors
tology for Research on Regulation of and Through IT Ar- apply a conceptual lens from De Vaujany et al. (2018),
tefacts of this editorial presents a conceptual ontology and which posits that assemblages of rules, IT artefacts, and
theoretical lens to guide future research. We develop this practices form an IT-based regulatory system or regime. The
over to provide a conceptual foundation and lens such that lens enables the authors to explain how nudging is enabled
researchers can (1) Identify and make sense of legal and by an IT artefact’s affordances of predicting and monitoring
regulatory concepts institutionalised and applied in gov- personal health states and actions. The study impressed both
ernment policy-making and frontline regulatory actions reviewers and editors through its in-depth case study, which
88 Journal of Information Technology 38(2)

Table 1. Special issue papers, technology, regulatory intervention, theory and method.

Digital Technology
and its Role in Level of regulatory
Special Issue Paper Regulation intervention Theoretical Approach Research Design

Investigating IT-based Mobile health Experiences of Behavioural nudging and Vignette and secondary data
Regulation of Personal applications through mobile health Vaujany et al.’s (2018) analysis (e.g. discussion
Health: Nudging, Mobile IT application users theory of IT based boards and policy docs)
Apps and Data (micro) Regulation
Governmental Regulation and Digital infrastructures Embedding Modular systems theory Conceptual development
Digital Infrastructure of IT regulation into from case studies
Innovation: The Mediating technology design
Role of Modular (macro/meso)
Architecture
Big Tech’s power, political, Digital platforms of Regulation of Corporate social Philosophical Essay
corporate social IT/through platforms responsibility (political
responsibility, and regulation (macro) philosophy)
To regulate or not to regulate: Digital platforms of Regulation of Institutional Theory, Longitudinal discourse
unravelling institutional IT/through IT content on news Institutional work analysis of two cases (news
tussles around regulating and social media and counterterrorism)
algorithmic control of digital platforms (meso)
platforms.
Identifying the Patterns: Digital platforms of IT Regulation of Digital platforms, Qualitative meta-analysis of
Towards a Systematic platforms ecosystems case studies
Approach to Digital Platform (macro)
Regulation
Regulation of Data-driven Digital platforms, Data-driven market Resource-based View Literature review of
Market Power in the Digital Business value from power (macro) (RBV) as applied to academic work; Research
Economy: Business Value big data of IT/ digital platforms, big questions, theory, and
Creation and Competitive through IT data, business value, framework development
Advantages from Big Data market power

involves the interpretation of several qualitative vignettes of concerns focus on the risks of misuse or abuse of DI for
use situations experienced by two health app users as surveillance, control and manipulation of consumers,
self-regulation. The article theorises how (1) IT artefacts workers, and society-at-large. There is also a concern about
increasingly underpin seemingly innocent (and often vol- cyber risks and digital resilience. Modular systems theory is
untary) regulatory practices towards positive individual and applied to explain the relationship between regulatory ac-
population outcomes; (2) Data gathered by IT artefacts tions and DI innovation. Extant case studies and constructs
create systems of regulatory feedback loops; and (3) net- are used for theoretical development and corroboration. The
works of individual, or organisational and technological authors identify that regulation of DI involves applying
actors will over time institutionalise IT-based regulatory regulatory provisions – that is, coercive mechanisms such as
regimes at macro-, meso-, and micro-levels. The authors obligations, prohibitions, and permissions – as command-
recognise negative affordances or the dark side of using IT and-control signals to firms to channel their product/service
artefacts in that two regulatory affordances (predicting and innovation. Such mechanisms share two characteristics in
surveillance) are treated as double-edged swords. The study that they focus on performance targets and activity speci-
highlights how a micro-level self-regulatory practice can be fication, both of which are posited to influence design rules
interweaved with broader organisational and regulatory and modularity, respectively. Consequently, they illustrate
processes and circumstances that enhance or diminish their how DI components may be designed and combined to
effectiveness for individuals and organisations. produce desired outputs and behaviours.
The paper titled ‘Governmental Regulation and Digital The paper suitably titled ‘Big Tech’s Power, Political
Infrastructure Innovation: The Mediating Role of Modular Corporate Social Responsibility, and Regulation’ by
Architecture’ by Henningsson and Eaton (2023) focuses on Lindman, Makinen and Kasanen (2023) is an essay on the
digital infrastructures (DI) consisting of autonomous AI rising political power of digital platforms (often called
machine learning models etc. They analyse how regulations FAANG or GAFAM2). The article analyses the sources and
may impact DI innovation in such a setting. Regulatory types of political power that come with the rise of platforms
Butler et al. 89

and the new types of institutional logics at play in orga- and evolution of discourses and negotiations (institutional
nisations. The authors posit that BigTech (FAANG/GA- tussles) that constitute the institutional work that leads to the
FAM) now wields significant political power in our society. creation of regulations that address the risks that algorithmic
This poses a serious challenge in regulating their business controls impose over news curation and content moderation.
and societal activities and the ways they use and leverage IT The model captures how regulating algorithmic control on
artefacts to achieve their business objectives at the expense digital platforms is formulated and justified. The analysis
of consumers and citizens. We interpret this as a twisting of reveals that the process is iterative and involves negotiations
what is presented as a manifest positive affordance to a between the government, digital platforms, third parties and
latent negative affordance that comes with IT artefacts. The civic stakeholders. The authors conclude that regulators
authors draw on the theories from political philosophy and ‘use strategies of collaboration and deliberation to reallocate
the literature on Corporate Social Responsibility to question responsibilities, support self-regulation, leverage expertise
the traditional assumption that platform firms are pure of the field and compensate for their lack of knowledge on
economic actors. They are also political actors posing risks regulating algorithmic content display’. Digital platform
to citizenship rights, civic society, and related democratic firms are found to use strategic resources and power to curb
processes. The paper focuses on the role of regulation while the instalment of new regulations when a regulation
mitigating such risks. It argues that there is a classic division threatens their business model. Institutional work involves
of moral labour between institutional actors – government not only lobbying but bribery and agency capture (Hawley,
and public administration and private business interests in a 2021). Furthermore, we note that although algorithms can
market economy, which needs to be re-framed in the era of be made transparent, firms keep their operations black
Big Tech. The authors draw on political philosophy theories boxed to avoid litigation (Ward, 2022). This business ap-
to develop a research agenda that sensitises IS researchers to proach identifies the need for IS researchers to adopt a
issues of civic ethics. Future directions for IS research into critical perspective which recognises the power of digital
the regulation of and through IT focus on the following platform operators and the information asymmetries that
themes: (1) Business versus Politics, (2) Democratic exist between regulators and platforms, and the need for
Government. (3) Institutions of market economy; (4) increased openness and transparency of regulating algo-
Companies, (5) Civil Society, and (6) Citizens. This paper rithms (cf. Lindman et al., 2023; Mikalef et al., 2022; Ward,
builds a necessary philosophical framing to think about the 2022).
conditions and principles to regulate digital platforms at the The paper by Gleiss et al., (2023) is titled ‘Identifying the
societal level and provides essential additions to the earlier Patterns: Towards a Systematic Approach to Digital
agenda paper by De Reuver, Sørensen and Basole (2018). Platform Regulation’. The article focuses again on the
Investigative journalism and book authors will continue to power and influence of large digital platforms (FAANG/
uncover corporate malfeasance beyond lobbying (see Hari, GAFAM). The study incorporates several perspectives on
2022; Ward, 2022): BigTech Platforms such as Uber and digital platforms and regulation. It conducts a qualitative
Airbnb will continue to engage in political activities in- meta-analysis of 128 data sources gathered from newspaper
volving questionable ethics, highlighting how governments articles, policy reports, and academic literature that report
fail to regulate corporate misconduct and control corporate on platforms and their operations. Content analysis and
power (Culpepper and Thelen, 2020). coding of this data corpus results in a conceptual model,
The paper by Karanasios, Kokshaguna and Reinecke which offers an ontology of digital platform regulation with
(2023) titled ‘To Regulate or Not to Regulate: Unravelling four taxonomic dimensions: (1) Regulation Type, which
Institutional Tussles Around the Regulation of Algorithmic institutes (2) Controls, that mitigate (3) Risk Class, which
Control of Digital Platforms’ poses the research question, impacts (4) Societal Actors. The regulatory concerns are
‘How does the institutional work… unfold in the devel- expressed in strategies focussing on the risks that Digital
opment of regulation of the use of algorithmic control of Platforms impose on society. These are found in the af-
content by digital platforms?’ The authors draw on insti- fordances of digital platforms and their potential for mo-
tutional theory’s concept of institutional work to develop a nopolistic market dominance. The paper synthesises
process model of the institutional work required to regulate emerging research on digital platform regulation by fo-
algorithmic control on digital platforms. Institutional work cussing on the risks the platforms pose on the economy and
is, by necessity, pluralistic and conducted by multiple society and articulating a comprehensive interdisciplinary
stakeholders. The analysis of institutional work shows how view of the topic grounded in empirical data. We observe
regulations governing the algorithms for news curation and that future research needs to unpack the digital infra-
content moderation were instituted in Australia. The authors structure components on platforms such that regulators can
employ discourse analysis on two regulatory cases by respond with accurate and feasible regulatory measures
drawing on sampled data from media and policy and in- which address the needs for interoperability, resource
dustry documents in Australia. They interpret the content sharing, and transparency. The conclusions invited us to
90 Journal of Information Technology 38(2)

reflect on the current EU’s approach of using principle- understudied (see below our review of emerging
based regulation that is essentially technology neutral. It technologies)
imposes sanctions of the scale of those in GDPR for those 3. Methodologies rely heavily on secondary data (e.g.
who do not apply such principles. This, we feel, offers an from news outlets) and literature reviews; experi-
optimal path to mitigate the risks facing society: However, ments and or/action research is nearly non-existent.
the risks posed by monopolistic digital platforms also need 4. Theoretical perspectives remain diverse, but given
to be addressed if societal actors are to be protected. the diversity, there is a need for a more coherent
Regulation of Data-driven Market Power in the Digital theoretical grounding and integration, especially of
Economy: Business Value Creation and Competitive Ad- the role and impact of IT artefacts. We will examine
vantages from Big Data by Schnurr et al., (2023) is the last this next.
paper in this special issue. This paper examines the regu-
lation of digital platforms that create natural monopolies by
creating big data resources that generate business value
Towards an ontology for research on
similar to monopoly rents. The authors draw on the
resource-based view (RBV) as a lens to examine how digital regulation of and through IT artefacts
platforms create value from big data, on the one hand, which Given The Regulation and digital innovation: From ap-
leads to unfair practices and consumer, market, and societal plications to digital infrastructures, algorithms to digital
domination on the other. The authors pose three research platforms’s critical notes concerning the state of research,
questions illustrating how market power based on valuable we felt that to guide research in the regulation of and
and inimitable big data resources and associated IT artefacts through IT, a conceptual framework is required. Thus, the
influence regulatory requirements and enable technology- objective of this section is to develop a conceptual ontology
based regulation to be implemented and enforced. The first that meets this requirement. Therefore, delineate the core
two questions ask whether and why data-driven value concepts of regulation and risk and discuss how IT artefacts
creation requires regulation and market supervision. The relate to regulatory processes and activities. Institutional
answer to the third question on technology-based regulation theory offers a versatile conceptual foundation to study
provides the main contribution to this special issue and regulatory processes and outcomes as a form of institutional
analyses how to regulate through IT data platforms. The first work. In this regard, we were pleased to find one paper
contribution of the article is an integrated research frame- (Henningsson and Eaton, 2023) that qualified for inclusion
work on how relationships between digital platforms, big in the special issue which applied this perspective. This
data, market power, and IT regulation are formed. They section now presents and defines the core concepts relevant
posit three roles for IT artefacts in the implementation of to research on the regulation of and through IT that con-
regulation through IT: (1) IT renders novel approaches to stitute the ontology presented.
the regulation through its ability to provide consumers with
transparency and control; (2) IT lowers the cost of regu-
latory compliance; and (3) and IT artefacts provide regu-
Unpacking the complex concept of regulation
lators with enhanced supervisory mechanisms to enforce
regulatory rules. The findings corroborate the findings of Regulation is a complex phenomenon typically conceived
several field studies in the UK, US, and EU financial in- as ‘government intervention in the private domain or a legal
dustry on RegTech and supervisory technologies or Sup- rule that implements such intervention’ (Orbach, 2012,
Tech in the financial industry. Frontline regulators and p. 6). Citing John Stuart Mill, Orbach (ibid. p. 10) states that
supervisory agencies can now access, curate, analyse, audit, regulation is required because ‘things that have “useful
and risk assess firm-specific data at scale using varying IT purposes” can turn “poisonous” when abused’ due to ‘our
artefacts (see Butler, 2017; Broeders and Prenio, 2018; imperfect reality and human limitations’. Baldwin, Cave,
Butler and O’Brien, 2019; Gasparri, 2019). and Lodge (2011) advanced a generally accepted framing of
We conclude with some critical notes concerning the this area and summarised the essential features of
scope and topics of the submitted articles concerning regulation:
regulation through and of IT:
· Governments regulate in the public interest and
1. There is a need for empirical (design science) studies follow several rationales (justifications) for such
of regulating through technology. activity.
2. There is a currently (understandable) focus on digital · Several regulatory strategies will be employed, in-
platforms (GAFAM/FAANG) and their regulation cluding viz. command-and-control, incentives,
(such as privacy issues), but other fields, such as AI, competition laws, franchising, disclosure regulation,
IoT and others posing new challenges, remain direct action, rights, and liabilities.
Butler et al. 91

· Where technologies are concerned, governments ei- like principles. In contrast, principles may be linked
ther regulate positively by providing economic in- with normative standards and practices and become
centives for their adoption and use or by regulating more rule-like, creating regulatory hybrids.
and mitigating the risks of their use to individuals, In the EU, risk-based regulation of IT generally
groups, sectors, society, and the environment (cf. emphasises self- and co-regulation by applying prin-
Wiener, 2004). In the regulation of technology: ciples while simultaneously mandating compliance
(a) Regulators can regulate technologies for private with normative standards and industry codes of conduct
or public interests. as evidence of adherence to regulatory principles
(b) Technology risk is defined in terms of hazards or (Ullrich, 2018; Colangelo et al., 2021). Most IT arte-
losses posed to social and institutional entities if facts and digital infrastructure components such as AI
a technology-related threat-vulnerability com- (Gupta, 2022) and how data is processed and stored on
bination produces a hazard or loss (cf. Kates and platforms are now being subjected to growing regula-
Kasperson, 1983). tion in the EU (Feld, 2019; Flew and Gillett, 2021;
· As a regulatory strategy, risk regulation focuses on Mansell, 2021; Bennett, 2021; Nitzberg and Zysman,
the hazards and risks imposed on individuals and 2022). While analysing the EU’s approach to the reg-
society, the legitimation of related interventions, ulation of IT, Mantelero et al. (2020) identify the use of
conducting risk assessments and scoring techniques, (1) principles-based provisions and technical rules; (2)
and coordinating operations for enforcement and standards-based technologies perceived as necessary in
compliance. achieving data protection and security objectives; and
· Regulation occurs at multiple levels: For example, (3) mechanisms such as risk assessment, compliance
Federal to State (e.g. US), Unions of Member States by-design, compliance reporting obligations, digital
(EU), and Central to Local Government. The power resilience, and the use of certification schemes to
to regulate may be delegated to statutory and other demonstrate compliance. While the financial industry is
bodies, agencies, authorities and so on (e.g. frontline often in the cross-hairs with governments concerning
regulators Ford (2008)). regulatory principles and rules, it engages in what is
called ‘institutional tussles’ to ensure a favourable
While this conceptualisation highlights the anatomy of regulatory climate for the industry (Karanasios et al.,
regulatory approaches, regulation in practice is more nu- 2023; Colangelo et al., 2021).
anced. Weiner (2004, p. 495) argues that the ‘influence of All these developments have significant implications for
regulation on technology is complex and depends on the IS research on the regulation of and through IT. First, re-
technology of regulation—the design and instrument choice searchers need to have a nuanced understanding of regu-
of the regulatory intervention’. Regulators, therefore, need latory provisions governing IT artefacts and data assets and
to design regulatory instruments to manage the complexity whether they are principles-based, rules-based, or contain
and, at the same time, endeavour to avoid stifling inno- both principles and rules. As part of this, they need to
vation. The European Commission’s Regulatory Obstacles understand the role and impact of IT artefacts in conducting
to Financial Innovation Expert Group report advising the either principle-based or rule-based regulation (de Vayjanay
Commission policymakers on Fintech is one example of et al., 2018). Second, they need to identify the consequences
how regulators approach this dilemma or trade-off (see of institutional responses within regulated sectors and
Paech and Butler, 2019). whether and how they impact organisations, consumers,
Depending on the institutional, economic, and su- citizens, and society. That is not an easy task, but necessary.
pervisory context, regulators have a rich palette to Table 2 presents essential properties of principle- and rules-
choose from when proposing regulatory solutions. based regimes related to IT-based regulation. As most
Generally, as Burgemeestre, Hulstijn and Tan (2009) regulatory responses are hybrid, they sit on a continuum:
point out, regulation can be principle-based, rule- Thus, research on the regulation of and through IT must be
based, or a hybrid of principles and rules (see also sensitive to such differences and their effects on regulatory
Tarbert, 2019). The difference between the rules and processes.
principles is that ‘a rule generally entails an advance Public awareness of the necessity to regulate IT-related
determination of what conduct is permissible, leaving matters began with the accounting malfeasance within
only factual issues to be determined by the frontline Enron, WorldCom, and Global Crossing in 2005. However,
regulator or decision maker. A principle may entail Europe had at this time its own issues with corporate
leaving both specification of what conduct is permis- governance and accounting (Sama and Shoaf, 2005). In
sible and factual issues to the frontline regulator’. (Ford terms of accounting standards enacted in IT artefacts, the US
2008, p. 6–7). Moreover, regulatory rules may have GAAP is rules-based, and the IFRS is principles-based
qualifications and exceptions and become thus more (Prather-Kinsey, Boyar, and Hood, 2018): The regulatory
92 Journal of Information Technology 38(2)

Table 2. A characterisation of principles and rules (adapted from Burgemeestre, Hulstijn, and Tan, (2009) and Wiener, 2004).

Regulatory Mode

Regulatory Dimension Principles Rules

Temporal Ex-post Ex ante


Conceptual General / universal / abstract Specific / particular / concrete
Functional Large discretionary power Little discretionary power
Representation Declarative (what) Procedural (how)
Requirements Performance standards Command-and-control
Knowledge High Low
Exception handling Allows for exceptions (defeasible) All or nothing (strict)
Conflict resolution By weight (trade-off) No conflicts possible

responses to financial scandals followed similar lines. The approach, reporting obligations, resilience, and certification
US-based response in the form of the SOX Act was rule- schemes)’ (Mantelero et al., 2020, p. 328).
based, while the European Commission’s response was to To formulate effective rules, regulators now must have
recommend the modernisation of company law based on comprehensive knowledge about regulated entities (see
principles and leave any rulemaking, if required, to member Table 2). Otherwise, organisations will engage in regulatory
states (European Commission, 2003). Fast forward a de- arbitrage and rule evasion. As Omarova (2010, p. 411)
cade, and the EU’s decision on GDPR has a different tone. states: ‘Given the complexity and global nature of the
Now regulators in EU member states acknowledge that modern financial market, any government’s attempt to
‘Principles – broad rules about conduct or desired regulate it in a purely unilateral command-and-control
outcomes – are an important part of data protection law, and manner will inevitably encounter the fundamental prob-
are, in fact, at the core of the General Data Protection lem of regulatory arbitrage, whereby financial institutions
Regulation (GDPR)’.3 However, GDPR now provides for find new ways to get around government rules, thus creating
stricter rules to cover, for example, data processing and a never-ending spiral of rulemaking and rule evading’. The
consent, as well as mandatory legal requirements and use of principles, specific or targeted rules, sanctions, and
sanctions (Jasmontaite et al., 2018). Indeed, the regulatory the courts to adjudicate breaches of regulatory compliance
principles of data protection by design and related legal works well in jurisdictions and avoids constraining tech-
obligations have had significant implications for the de- nological innovation. This approach is optimal when
velopment of information systems that hold personal data. considering the fundamental type of IT risk most organi-
In consequence, GDPR’s Article 25 ‘suffers from multiple zations now face – operational risk.
flaws, in particular a lack of clarity over the parameters and
methodologies for achieving its goals, a failure to com-
The risk concept and its temporal dimensions
municate clearly and directly with those engaged in the
engineering of information systems, and a failure to provide Risk can be defined in many ways depending on the context
the necessary incentives to spur the “hardwiring” of (see; Aven and Renn, 2009; Crouhy, Galai, and Mark, 2006;
privacy-related interests. Taken together, these flaws will Renn, 2017; Aven et al., 2018). The Society of Risk
likely hinder the traction of Article 25 requirements on Analysis holds that risk is the consequence of an activity
information systems development’ (Bygrave, 2017, p. 105). and associated uncertainty (Aven et al., 2018). Thus, the
Significantly, according to Mantelero et al. (2020), the EU’s consequences (C) of the effect of a risk event (A) on an
regulatory approach sees principles set out in one regulation activity (α) may have different manifestations and may be
and rules in another: There, general principles and provi- present at different levels: Uncertainty (U) refers to the
sions find detailed expression and application in sector- ‘deficiency of information related to, understanding or
specific instruments, such as the cybersecurity NIS Direc- knowledge of, an event [A], its consequence [C], or like-
tive, payments PSD2 Directive and electronic ID eIDAS lihood’.4 Thus, if regulators perceive that there is uncer-
regulation. Overall, the EU’s approach now provides ‘a tainty regarding the risks IT artefacts pose such a risk event
balance between principles-based provisions and technical materialise they will need to act.
rules, a variety of technological solutions seen by law as Building on Aven (2011, 2015, 2019) and Logan et al.
crucial to achieving the EU objectives in data protection and (2021), we next conceptualise risk as it relates to IT-based
data security, and a clustering of the entire legal framework regulation in a way that incorporates temporal dimensions.
around five core elements (risk assessment, by-design We conceptualise risk thus as
Butler et al. 93

Risk ¼ ðC, U Þ ατ , η (1) nomenclature by Logan et al. provides a way to estimate the
total combined risk of a set of activities α1, α2. Bjørnsen and
If we consider an activity α in the context of digital Aven argue that the uncertainty measure Q should therefore
operations, that activity will, in whole or part, be digitised include an assessment of the strength of the knowledge
and performed by one or more IT artefacts. What this risk (SoK) on the probability measure (P) (whether based on
definition means is that risk is a function of the Conse- objective or subjective probability assessments) of each risk
quences (C) and Uncertainty (U) surrounding the threats (Aven, 2017). Hence, we can rewrite the above to capture
and vulnerabilities of using IT artefacts within an activity (α) these and the temporal dimensions posited by Logan et al.
over a time interval (τ) and the time over which the con- (2021)
sequences will materialise (η). The above conceptualisation
(1.0) incorporates two temporal dimensions: (1) The length R’α1 þ α2 ¼ ððC’α1 C’α2 Þ, ððPα1, Pα2 Þ, ðSoKα1 , SoKα2 ÞÞ,
of time IT-enabled digital activities are assessed for risk ðKα1, Kα2, KAG ÞÞα1τ, ηþα2τ, η (2)
events (A); and (2) The time horizon over which the con-
sequences (C) materialise, that is C given A (C | A). We now where KAG represents knowledge of the independence or
attend to uncertainty U as it forms a core concept in ex- dependence of activities and their consequences.
plaining any IT-related risk. Since regulators conduct risk assessments and draft
A typical regulatory or organisational assessment of regulations to address risk in terms of the consequences and
possible IT artefact risk events includes gathering infor- uncertainty associated with, for example, technologies in
mation on the threats to, vulnerabilities of, and conse- human activity systems, then such a complex con-
quences for digitised activities (α), their outputs (e.g. ceptualisation of risk is required to reach empirical fidelity.
services to consumers), and related IT assets. Aven et al. Furthermore, such conceptualisation is necessary to un-
(2018, p. 4) propose that, inter alia, risk may also be further derstand whether the institutional work around the social
defined: First, rewrite U as ‘[t]he pair (Q, K), where Q is a construction of the regulation of IT artefacts involves
measure of uncertainty and K the background knowledge considerations of all the elements required to understand
that supports Q’: Thus, actors need to consider risk in terms risk and how to mitigate it. In addition, the design of in-
of the ‘[t]he triplet (C’, Q, K), where C’ is some specified formation systems that regulate through IT will involve, by
consequences [e.g. a data loss], Q a measure of uncertainty necessity, the integration and application of all the above
[of an IT failure or cyber threat], associated with C’ (typ- elements necessary to reduce uncertainty and increase
ically probability), and K the background knowledge that knowledge of the consequences of IT risk events. Clearly,
supports [understanding of] C’ and Q (which includes a IT-based regulation can increase the reliability of the op-
judgment of the strength of this knowledge)’. Regulators’ or erations, information concerning uncertainties and depen-
organisational actors’ estimation of Q will, depending on dencies, or knowledge that backs the aggregation and
circumstances, involve a combination of heuristics, in- integration of uncertainties. Regulatory IS can also influ-
ductive reasoning, and deductive modelling and related ence the time frame in which risks are assessed and in which
combinations of knowledge that help measure uncertainty they are assumed to realise and generate consequences.
surrounding the threats to, vulnerabilities of and conse-
quences of risk events to IT artefacts (cf. Volz and
Gigerenzer, 2012; Mousavi and Gigerenzer, 2014). Aven
On the need to regulate risk in IT artefacts
(2019) argues further that estimates of Q usually are treated In the past, information technology risk was simply un-
as probabilities based on historical events, such as the derstood in terms of threats to and vulnerabilities of in-
practice of estimating operational risk in financial institu- formation systems operations in specific organisational
tions. Alas, these are often of little value when risk analysis settings (Rainer, Snyder, and Carr, 1991). Some studies
needs to be thorough and synthesise contextual knowledge recognised also process failures while IT/IS systems were
(K), and measures of uncertainty (Q) of aggregates and being developed and implemented (Lyytinen et al. 1998;
specific risk events (A) related to general or specific IT- Lyytinen and Robey, 1999). The financial industry has been
enabled digital activity(ies) (α) over a time interval τ, and traditionally the most IT and data-intensive industry (Butler
were η specifies the period over which the consequences C and Abi Lahoud, 2014) and engaged in evaluating related
of risk event A is considered. operational risks. For example, the Committee of Spon-
One additional dimension that needs to be often ad- soring Organizations of the Treadway Commission (COSO)
dressed in the conceptualisation of risk is risk aggregation, developed business guidelines for risk management and
which regulators and organisations need to perform while control. Already in 1991, COSO proposed operational risk
estimating systemic risks and total system-level risk ex- as a generic concept. However, the Basel Committee on
posures. Integrating Bjørnsen and Aven’s (2019) con- Banking Supervision (BCBS), which is an international
ceptualisation on risk aggregation and adopting the committee of national banking regulators and supervisors,
94 Journal of Information Technology 38(2)

focused on operational risk in its report on Risks in Com- to identify obstacles to innovation and institutionalise so-
puter and Telecommunication Systems (BCBS, 1989). In lutions ex-post (Troitiño and Kerikmäe, 2021).
2001, the Basel Committee on Banking Supervision re- It is recognised increasingly that there is a need to
defined operational risk as ‘[t]he risk of loss resulting from identify and categorise IT artefacts on the regulatory radar
inadequate or failed internal processes, people and systems across industry sectors and how they are perceived in terms
or from external events’ (BCBS, 2001; Power, 2005). The of their positive (benefits, rewards) and negative affor-
later BCBS Basel2 Accord (BCBS, 2004) recognised dances (hazards, downside risks, threats, vulnerabilities)
capital requirements for operational risks related to losses (Scarantino, 2003). Alas, the papers in this special issue
arising from errors in processes, internal frauds, and in- were quite limited in how they identified and categorised
formation technology (IT) (Penikas, 2015). negative affordances and related risks in IT artefacts (mostly
Operational risks arose in a broader awareness with the data-related risks). This is an issue we next address.
Enron, WorldCom, and Global Crossing scandals, as fi- An example of institutional work to bring balance to the
nancial crime was made possible through IT-based IS. This regulation of IT and innovation is the European Commis-
led to instituting the Sarbanes-Oxley Act (SOX) as a sion’s Regulatory Obstacles to Financial Innovation Expert
regulatory response to mitigate the financial risks of using Group (ROFIEG). This group’s final report presents a
IS by organizations (Parent and Reich, 2009). Since then, taxonomy of the IT artefacts identified, categorised, and
governments have broadened their focus on IT risks, as conceptualised as being innovative technologies (FinTech)
information systems have become ubiquitous across in- whose positive affordances can bring economic and busi-
dustries with the aim to automate and informate activities ness benefits to the financial industry, on one hand while
(Zuboff, 1985). IT-enabled digital innovation and trans- posing significant risks to individuals, groups, organisa-
formation now provide novel mechanisms to deliver tions, and the overall financial system through negative
products and services to consumers while also gathering a affordances, on the other (see Paech, Butler et al., 2019).
wealth of data about them. The IT artefacts in digital in- This list is reproduced and extended in Table 3. The table
frastructures create a host of new risks affecting also other categorises IT Artefacts deemed innovative by a panel of
stakeholders, including the risk of data loss and infor- regulators and financial industry practitioners (Paech, Butler
mation privacy (Kirby, 2009; Parent and Reich, 2009; et al., 2019). The positive affordances they identified are
Zuboff 2020). The aftermath of the financial crisis in listed: However, they also identified negative affordances,
2008 led to the introduction of a raft of stringent new which are presented as risk types along with their interpreted
regulations for operations within global financial institu- hazard level in Table 3.
tions (Butler and O’Brien, 2019; Currie and Seddon, 2017; The technologies listed above touch the lives and live-
Mattli, 2019). The growth of such measures continues to lihoods of all individuals and societies. However, the World
this day, with an increasing focus on the risks posed by the Economic Forum (2022), in its Global Risks Report, notes
digital transformation of all facets of banking as new forms the failure of governments to adequately regulate the
of banking services have emerged, including crypto- negative affordances of these emerging technologies across
currencies and other FinTech innovations (European industries. Exceptions here are the pharmaceutical industry
Commission, 2020). However, in all these efforts, as and the healthcare sector, which are well-regulated already
Clark-Ginsberg and Slayton (2019) note, novel risks posed (Dickson, 2003; Papp, 2006; Theisen and Neill, 2004;
by critical infrastructures when strictly regulated will lead Bendale et al., 2011; Shuren, Patel, and Gottlieb, 2018;
to increasingly complex socio-technical systems with new Schueler and Ostler, 2016).
‘recursive’ risks. Regulators’ influence is, therefore, best
viewed as emergent arising from the interaction between
regulators and the regulated and through various forms of Regulation through IT: From GRC, regtech, suptech
institutional work that justify specific forms of interven-
and social justice and control
tions as legitimate.
States, federations, and political unions regulate now eGovernment is defined as the use of IT by governments and
positively to leverage IT innovations that confer new af- related agencies to inform and engage with state citizens and
fordances to promote economic, social, and environmental business entities (Cordelia, 2007). IT in the public sector
well-being (Lundvall and Borrás, 2005; Kim and Yoo, focuses on applying digital systems ‘to improve the quality,
2019; Cheng et al., 2021). However, in retrospect, states performance, and responsiveness of public sector institu-
and regulatory agencies mostly recognise that the adoption, tions, thereby potentially improving trust’ (Smith, 2011,
implementation, and use of IT brings a range of socio- p. 78). However, in the digital society, citizens are provided
economic risks for individual citizens, groups, and for with various government systems that informate and au-
society and humanity (Clark and Claffy, 2015): The EU has tomate (Zuboff, 1985) public service processes and incor-
been particularly sensitive in this regard as it has attempted porate and apply regulatory rules in taxation, social welfare,
Butler et al.

Table 3. Identifying risk levels in innovative IT artefacts and infrastructures.

IT Artefact Description Positive Affordances Risk Type and Level

Artificial Intelligence - Robotic Process Automation for office


1. Knowledge representation (KR, capturing semantics in models such High
as ‘ontologies’), automation, Including authentication. - Employment displacement
2. Natural language processing (NLP), - Risk alerts and compliance monitoring. - Unexplainable decisions.
- Automated speech and writing.
3. Machine learning (ML) and deep learning (DL), which is a form of ML - Discrimination in loans, mortgages,
using artificial neural networks (ANN). The growth and power of- Descriptive analytics for regulation and health/life insurance.
machine learning algorithms, natural language processing, and summarisation. - Bias in decisions
artificial neural networks made weak AI or perceptual computing- Predictive analytics for investment - Misinformation.
possible. modelling and to assess insurance risk. - Breach of privacy.
- Diagnostic Analytics for fraud detection. - Market flash crashes and contagion.
- Prescriptive Analytics to assess credit and
risk underwriting.
- RoboAdvice regarding products and
services in the form of Chatbots and
Virtual Assistants.
- Digital Process Automation.
Blockchain/ Store tamper-proof, time-stamped transactions or records on a - Shared recordkeeping Medium-High
Distributed Ledger distributed data store. May share public or private records of - Multi-party consensus, independent - Misapplication to unsuitable use
Technologies transactions among parties in a process or transaction. validation, Tamper-proof evidence cases.
- Resilience provides a platform for digital - Poor transaction speeds.
currencies and assets and supply chain - High impact on GHG emissions
management. - High energy usage.
Smart Contracts Algorithms are designed to execute automatically specific - Loans and financing. Medium-High
programmatically defined contractual duties upon the occurrence - Mortgages. - Same as Blockchain/DLT if used to
of a trigger event. Complementary with DLT. - OTC (over-the-counter) trading of host Smart Contracts.
currencies (inc. crypto), commodities, and - Market flash crashes and contagion
securities. due to automated settlement
- Derivative trading - Immutability and inflexibility to
- Derivatives marketplace change.
- Insurance policies - Costly errors and hardcoded
- B2C. loopholes
- B2B. - Problem of translation of legalese and
- Regulatory reporting regulatory ambiguity.

(continued)
95
Table 3. (continued)
96

IT Artefact Description Positive Affordances Risk Type and Level

Quantum computing Enables faster computation over highly complex problems, which may - Help solve currently intractable problems High
be intractable for traditional computer platforms and applications in AI, for example, machine and deep - May make many existing
due to the need for massive computing power or where solving learning cybersecurity approaches, tools,
problems involves a high degree of uncertainty and incomplete - cryptography (e.g. make blockchain/DLT and standards obsolete.
knowledge. environmentally sustainable - Amplifies cybersecurity and AI risks.
- enhance high-frequency trading) - Amplifies the possibility of flash
- Develop new medicines and vaccines crashes and contagion.
- Pose significant risks to current
cybersecurity technologies and heightens
systemic risk.
Internet of Things Enhanced (Smart) ubiquitous consumer data gathering and control - Enable Smart or autonomous homes, High
(IoT) technologies. buildings, and transport. - Increases surveillance risk.
- Enhanced services with personalised - Decreases data and personal privacy.
messages - Increases conduct risk and
- Increase cross-selling opportunities. discrimination in financial services.
- Enhanced health risk data. - Amplifies cybersecurity and AI risks.
- Increase cybersecurity risk - Increases systemic cyber risk.
Cloud Private, Public, and Local, with Infrastructure-, Platform-, and - Increased efficiency in application Low-Medium (depending on third-
Software-as-a-Service models. deployment. party provider)
- Lower Total Cost of Ownership (ToC) for - Third-party risk may increase
applications and computing and network - May increase the risk of business
infrastructure. interruption, data loss, and
- Increased Cybersecurity capabilities. cybersecurity.
Depending on the model and provider.
Journal of Information Technology 38(2)
Butler et al. 97

criminal justice, and so on – thus, IT artefacts used in approaches, Data pull approaches, Machine-readable reg-
eGovernment systems also regulate. Research by Akhigbe ulation, Cloud computing, and Chatbots. The new tech-
et al. (2015, 2017, 2021) outlines the use of IT for regulatory nologies involved in Data Analytics include Big Data
compliance in business activities across sectors involving (Hadoop etc.), AI, involving the application of Knowledge
health, public safety, natural resources, the environment, Representation (KR) ontologies, Natural Language Pro-
fisheries, and the ocean, as well as banking and finance. cessing (NLP), and Machine Learning (ML) technologies
Akhigbe et al. (2015, pp. 90–91) indicate that IT artefacts covering Supervised learning, Unsupervised learning, Topic
that support regulation through IT in business for ‘regu- modelling, Random Forest, Image recognition, and Neural
latory compliance aim to meet desired goals such as networks (Broeders and Prenio, 2018).
identifying respective legal requirements from laws and In a broader societal context, the use of IT by gov-
regulations, checking and enforcing business process ernments and organisations to monitor citizens is of
compliance, and reporting on the state of compliance or concern (Norris, 2005; Zuboff, 2015). AI-based tech-
addressing any change in the process or identified re- niques, such as automated facial recognition, predictive
quirements’. However, as Akhigbe et al. (2017) posit, there algorithms, and biometrics, are increasingly being viewed
is a paucity of IS research on using IT by the state for as pervasive policing tools (Bacalu, 2021). Also of societal
regulatory compliance. This dearth of research is reflected in concern is the increased use of predictive sentencing al-
the papers submitted to this special issue. gorithms in the justice system, such as the COMPAS
There is, nevertheless, a growing body of literature on system (Washington, 2018). Predictive algorithms,
the application of IT by businesses to address a range of whether biometric or behavioural, being used by gov-
regulatory business and supervisory problems. The gov- ernments and businesses are argued to incur bias risks
ernance risk and compliance (GRC) sector and associated (Drozdowski et al., 2020). All of the aforementioned IT
GRC IS grew out of the regulatory demands of the artefacts enable regulation through IT. Again, such matters
Sarbanes-Oxley Act (SOX), Basel II, and a raft of envi- appear not to enjoy the attention of IS researchers and are
ronmental regulations (Butler, 2011; Butler and McGovern, lacunae that require attention.
2012; Papazafeiropoulou and Spanaki, 2016). However, an
increase in the volume, velocity, and variety of regulations
since the financial crisis has led to a new type of information A framework of institutional work on regulating of
system called regulatory technology (RegTech). RegTech
and through IT
‘(a) helps firms manage regulatory requirements and
compliance imperatives by identifying the impacts of A review of the IS literature suggests that institutional
regulatory provisions on business models, products and theory provides a rich framing opportunity for IS re-
services, functional activities, policies, operational proce- searchers studying how IT interacts with regulative, nor-
dures and controls; (b) enables compliant business systems mative, and cultural-cognitive processes and activities
and data; (c) helps control and manage regulatory, financial (Orlikowski and Barley, 2001; Mignerat and Rivard, 2009;
and non-financial risks; (d) performs regulatory compliance Hinings, Gegenhuber, and Greenwood, 2018; Butler and
reporting’ Butler and O’Brien (2019, p. 85). Regulators Hackney, 2021). Several salient concepts from institutional
across the globe have recently implemented IT systems that theory can thus enrich our understanding of how regulation
monitor, control, and enforce compliance among financial of and through IT can be created, maintained, or disrupted.
institutions (Broeders and Prenio, 2018). They also intro- This happens through micro-level behaviours called insti-
duce IT for supervisory purposes, which is referred to as tutional work (Lawrence and Suddaby, 2006; Gozman and
supervisory technology (SupTech). However, several Currie 2014; Henningsson and Eaton, 2023).
challenges and issues in this field need to be addressed The concepts of institutional environment (Scott, 2005)
(Monkiewicz, 2022), as SupTech and RegTech bring ad- and organisational field (DiMaggio and Powell, 1983)
ditional risks and opportunities (Gasparri, 2019). SupTech provide an essential macro-level lens for identifying sets
IT artefacts perform two activities: (1) Data Collection, of actors that engage in and populate institutional pro-
involving (a) data reporting (Automated reporting Real-time cesses, activities, and structures. DiMaggio and Powell
monitoring) and (b) data management (Consolidation, (1983, p. 143) define an organisational field as consisting
Validation, and Visualisation)); and (2) Data Analytics, of ‘[t]hose organisations that, in the aggregate, constitute a
which perform (a) Market surveillance (manipulation, in- recognized area of institutional life: [These include] key
sider trading), (b) Misconduct analysis (AML/CFT, Fraud, suppliers, resource and product consumers, regulatory
Mis-selling), (c) Micro-prudential (Credit risk, Liquidity agencies, and other organisations that produce similar
risk), and (d) Macro-prudential (Forecasting, Emerging risk services or products’. Other institutional actors, such as
signalling, Financial stability, Policy evaluation). Data policymakers, governments, NGOs, and social move-
collection approaches include using APIs, Data input ments, populate the broader institutional environment
98 Journal of Information Technology 38(2)

(Senyo et al., 2022a; Senyo et al., 2022b). This is not an 2018). Regulatory technologies, correspondingly, are not solely
exhaustive list of actors. objective ‘artefacts’ (Bamberger, 2009; Callon and Muniesa,
In the context of the regulation of IT artefacts, the in- 2005; Itami and Numagami, 1992; Muniesa et al., 2007; Preda,
stitutional environment and organisational field of the IT 2007; Zaloom, 2003). They create and circumscribe a particular
industry are created, maintained, and disrupted (1) by co- worldview that alters the decision-maker’s perceptions of the
ercive mechanisms (legislative and regulatory principles system designed to inform them (Heidegger, 1954). Indeed,
and rules) originating in government policy-making, reg- various scholars have recognised the performativity of IT ar-
ulatory agencies, the judiciary, and so on; (2) through tefacts and, correspondingly, the technological constitution of
normative mechanisms (from professional bodies and regulated ‘objective’ markets. IT artefacts ‘might authorize,
industry/trade standards bodies/associations, suppliers, allow, afford, encourage, permit, suggest influence, block,
consulting organisations, distributors, and so on); and render possible, forbid…’ actions and thereby implement in-
cultural-cognitive/mimetic mechanisms that originate in ternal controls (Latour, 2005, p. 72). In this way, ITartefacts play
and shape and influence logics and decisions of organisa- a salient role in underpinning compliance and control practices
tions, their competitors, shareholders, non-government by affording and constraining actions (Gibson, 1986; Majchrzak
organisations (NGOs), and society-at-large. and Markus, 2013; Zammuto et al., 2007; de Vayjanay et al.,
It is clear from our review of the literature on regulation 2018). Such constraints and affordances are composites of
and extant theorising on institutional work that a complex intertwined human agency, ‘the ability to form and realise
interplay of coercive mechanisms (lobbying, conflict, and goals’, and material agency, ‘the capacity for non-human sys-
economic pressures from dominant actors), normative tems to act on their own apart from human intervention’
(professional assessments, industry standards) and cultural- (Leonardi, 2011, p. 147–148).
cognitive/mimetic mechanisms (framing, translation) is at
play and constantly shapes the social construction of pol- Conceptual Ontology and Research Lens for
icies, legislation, regulations etc. We need also to consider
the multiple categories of activity involved in institutional
Future Studies
work, as identified by Lawrence and Suddaby (2006). Such In the field of knowledge engineering, ‘[a]n ontology is a
activities may be conceptualised as a network of mecha- formal, explicit specification of a shared conceptualization’
nisms, applied by institutional actors that socially construct (Studer et al., 1998, p. 184): Figure 1 presents a proposed
and produce institutional outcomes. The outcomes of in- ontology that captures and represents the concepts and
stitutional work on IT artefacts are regulations in the form of relationships salient to the regulation of and through IT. The
principles, rules, standards/guidelines and so on that the ontology semantics and relationship types are here captured
design and operation of such IT artefacts must comply with. in a UML Class Diagram. The legend explains the meaning
Following Lounsbury et al. (2021), we note that actors of the relationship symbols for those unfamiliar with UML
participating in institutional work typically operate under di- notation. The ontology elements were specified in The
vergent and conflicting institutional logics, which are defined as: Unpacking the Complex Concept of Regulation, The The
‘the socially constructed, historical pattern of material practices, Risk Concept and its Temporal Dimensions, The On
assumptions, values, beliefs, and rules by which individuals the Need to Regulate Risk in IT Artefacts, The Regulation
produce and reproduce their material subsistence, organize time through IT: From GRC, RegTech, The SupTech and Social
and space and provide meaning to their social reality’ (Thornton Justice and Control, The A Framework of Institutional Work
and Ocasio 1999, p. 804). Thus, institutional logics inform on Regulating of and through IT above. They represent
actors’ choices and the use of the mechanisms that create, bring related legal, regulatory, industry, standards and organisa-
about change to or maintain, or disrupt institutions and policies tional sub-domains and capture the governance, business
(Gozman and Currie, 2013). Take, for example, in discussing AI model, functional and operational activity dimensions.
technologies, Büthe et al. (2022, p. 12) state: ‘Laws, regulations The operational activity concept forms the nexus of the
and other measures to govern AI thus do not so much reflect model, as operational activities (1) deliver value propositions
inherent characteristics or objective truths about the technology by achieving business objectives; (2) generate operational
but reflect political actors’ perceptions given those actors’ and other risks by imposing threats to and vulnerabilities in
predisposition – and in the process of framing what needs to be people, processes, and IT systems; (3) are the targets of
addressed, they construct the technology’. business policies, standards and procedures and controls that
Regulations and laws are not objective facts but always implement business and regulatory compliance goals. The
involve social interpretation (Edelman and Suchman, 1997; example is industry specific to financial services but can be
Currie et al., 2018). IT-enabled IS underpin many such internal generalised to other sectors with minor adjustments.
controls: Furthermore, compliance efforts by necessity call for We can start with the regulatory domain, where we see
interpretations of rules, norms and logics encapsulated within IT the role of the Basel Committee on Banking Supervision.
artefacts (Orlikowski and Iacono, 2001; de Vayjanay et al., Their members are drawn from regulatory and
Butler et al. 99

Figure 1. Conceptual ontology for regulation of and through IT.

supervisory authorities across the globe, producing components, is captured as a transitive relationship via the
principles and accords, such as the Principles for the operational activity to the people, process (analogue and digital),
Sound Management of Operational Risk (BCBS, 2011, rules, IT artefact and its software, hardware/networking, and
2020). These principles are next transposed into regu- data components, as are the threats, vulnerability dimensions
latory provisions with some requirements formulated as and consequences. Regulatory organisations also have opera-
regulatory rules. The influence of regulated entities, tional activities that include people, processes, and IT artefacts.
banks, and other financial entities is not shown. However, Inter alia, these focus on drafting regulations, risk assessment,
this process shapes principles and accords and their data collection, data analytics, and supervising compliance.
adoption and application by regulators (Hughes, 2021). Thus, the central elements of the conceptual ontology could be
Regulations have multiple impacts on business organi- applied in research on regulatory organisations in their use of IT
sations, affecting business governance, business models, artefacts for regulation through IT.
business strategies, and business objectives and leading In studying the regulation of IT, it is essential to note that the
to the formation of business policies, standards and type – principles (requirement standards) or rules (command
procedures, and controls. The latter is essential as they are and control) – will determine the related policies, standards and
formal prescriptions on how operational risks, including procedures and controls that will be put in place. All these
IT risks, are to be mitigated. The standards, procedures, elements will be documented and captured in a GRC system or,
and controls are embedded in rules and processes, which in many organisations, Excel spreadsheets. In the financial
may be analogue (manual) or digital. If digitised, they are sector, the minimum regulators demand is a risk management
types of regulation through IT (de Vaujanay et al. 2018). framework with a risk taxonomy and a risk register mapped to
They may be directly embedded in business applications, controls. It may be difficult to understand, but risk management
GRC IS or RegTech applications. and compliance reporting processes have yet to be properly
At the core of the model is the concept of operational activity. digitised. Across the industry, there is an over-reliance on
The people, process, IT artefacts (systems), and third-party manual risk control self-assessment (RCSA) (Hughes, 2021).
(external events) dimensions specified by BCBS (2001, Compliance reporting is another area where financial
2011, 2020) are included. The link to risk and control di- institutions fail to transform digitally with unreliable,
mensions, which are inherent in an operational activity and its labour-intensive approaches to financial, risk and
100 Journal of Information Technology 38(2)

compliance reporting. Take, for example, the ‘Dear CEO’ In this regard, the model also provides a valuable framework
letter in September 2021 from the UK’s Prudential Regu- for studying regulation through IT.
latory Authority, which questioned the quality and reli- Table 4 draws on The Unpacking the Complex Concept
ability of regulatory compliance reporting.5 In 2022, of Regulation, The The Risk Concept and its Temporal
another ‘Dear CEO’ letter pointed towards the same issues Dimensions, The On the Need to Regulate Risk in IT Ar-
causing significant financial and operational risk problems.6 tefacts, The Regulation through IT: From GRC, RegTech,

Table 4. Regulatory and business domain research questions on the regulation of and through IT.

Regulatory domain research questions business domain research questions

Institutional Work on Regulation of and through IT Governance


• What type of institutional work produced a particular • What policies, standards and procedures, and controls were or
regulation(s) (or guiding principles/standards/accords)? needed to be implemented in an organisation to comply with
regulatory requirements?
• Who participated in the social construction of the regulations? Risk Management and Compliance Reporting
• Who participated in the social construction of the regulations? • Have critical business activities, related people, processes, and IT
systems (to software, data, and computer network infrastructure)
been identified, risk assessed, and their relationships mapped?
• What was the level of public and industry consultation? • Do the IT artefacts and their affordances map onto the policies,
standards and procedures and controls? Can this be
demonstrated?
• What institutional logics were identified in and across • Have these dimensions been mapped to third-parties service
institutional groups and networks? providers, whether enabling processes or through SaaS, PaaS, or
IaaS, in the cloud?
• What institutional mechanisms were employed? • Are the risk and control functions integrated or siloed?
Regulation of IT • How are risks and controls assessed and audited?
• Was the regulation rule-based, principal-based or hybrid? Why? • Is risk control self-assessment (RCSA) in the organisation?
• Were the impact and implications on governance, business • What industry standards are in place to perform IT governance,
models, strategies and objectives considered? risk management, and control?
• Was there a balance between innovation, intended and Regulation through IT
unintended consequences, and negative affordances?
• Were the business activities within the scope of regulatory • Are the risk management and regulatory compliance activities
provisions identified? digitised in an organisation (e.g. using RegTech/GRC)?
Risk • What is the level of digital automation and information of risk
assessment, control, and compliance reporting in the
organisation?
• Were the risk-generating people, processes and IT systems • Are key risk indicators (KRI) and key control indicators (KCI)
identified? identified, employed, and digitised?
• As IT artefact risk is a category of operational risk, were the • Are multiple IT artefacts from different vendors employed for
threats, vulnerabilities, and consequences identified by this, or does the organisation have an enterprise-wide IT artefact
regulators? How? to perform GRC?
• How strong was the regulatory knowledge (inverse of • Are control rules digitised in operational applications and
uncertainty) of the IT artefacts under consideration? management systems?
• Was a risk assessment carried out? • Has digital transformation been leveraged to ensure the
digitalisation of risk and compliance management and reporting
processes?
Principles, Rules and Standards
• Are the instituted rules enforceable? Can they lead to regulatory
arbitrage?
• Which industry standards and guidelines were specified for
adoption in proving compliance with regulatory principles?
• Was a regulatory impact assessment conducted?
Regulation through IT
• What digitalisation (SupTech) level is in evidence among
regulatory and supervisory agencies?
• What type of IT artefacts are being used for SupTech systems?
Butler et al. 101

The SupTech and Social Justice and Control, The A information on validation datasets in several FDA-regulated
Framework of Institutional Work on Regulating of and AI/ML algorithms makes it difficult to justify clinical ap-
through IT and the conceptual ontology to identify the plications since their generalizability and presence of bias
category, type, and scope of research questions that future cannot be inferred’ (Ebrahimian et al., 2022, p. 559; cf.
research on the regulation of and through IT should answer Gerke et al., 2020). We believe this is an important study
to build a cumulative body of rigorous and relevant re- area worthy of IS researchers’ attention.
search. The questions are not exhaustive: Rather, they il- The remaining papers in this special issue focus on
lustrate the type of inquiries that researchers should make various aspects of digital infrastructures and platforms. As
when exploring the phenomena of interest at whatever level with regulatory concerns surrounding the use of AI there is
of analysis they are operating. Furthermore, it must be noted a growing concern across society regarding the use of ML-
that the two groups of regulatory and business domain and NLP-based IT artefacts in digital infrastructures and
questions are related and comprehending both domains and platforms (Blauth, Gstrein, and Zwitter, 2022; Büthe et al.,
how they interact is vital for achieving an overall under- 2022; Chang, 2022; Korngiebel and Mooney, 2021;
standing. Ultimately, the strength of a conceptual ontology Mikalef et al., 2022; Wright, 2021). Two books published
such as this is the way in which it provides a common in 2022, the first titled The Loop by a science and tech-
language (i.e. conceptual semantics) and maps the complex nology journalist for NBC (Ward, 2022), and the second,
web of relationships between concepts. Stolen Focus by a British investigative journalist (Hari,
2022), present extensive evidence that designers of digital
infrastructures deliberately leveraged negative affordances
Conclusions of ML-based AI algorithms to exploit known psycho-
While SOX, GDPR, Cybersecurity, digital services, and logical weaknesses in humans. Both authors point to Nir
markets regulations cut across all the industry sectors in Eyal, author of Hooked: How to Build Habit-Forming
terms of the need to regulate IT, specific organisational Products, among other sources, to illustrate why AI al-
fields, such as the financial industry, the pharmaceutical gorithms require regulation. This has only recently been
industry (including the biopharmaceutical sector), the ICT touched by IS researchers, viz. Tomalin (2022, p. 3) states
sector (covering all forms of digital innovation, products that ‘certain online platforms have been specifically de-
and services), the electrical and electronics (ICT signed to induce addiction’ (see also Moqbel and Kock,
manufacturing) industry, and the Medical and Healthcare 2018). Some of those responsible for designing the IT
industries have a considerable level of field-specific regu- artefacts in question have called for their regulation and a
lation focused on IT artefacts and their design and use. The change in digital platform business models (Hari, 2022).
papers in this special issue cover just the tip of the iceberg in The recent special issue of the European Journal of In-
this socially significant IS research area. formation Systems focused on differentiating between
The first paper in this special issue focused on regulation ‘responsible AI and “dark side” of AI’, and briefly on the
through IT by investigating the experiences of mobile health need for laws and regulation (Mikalef et al., 2022):
application users (Davidson et al., 2023). In a broader However, while the special issue noted AI’s ‘negative or
context, regulators are concerned about the increased use of unintended consequences’ (Ibid., p. 258), the existence of,
software in medical devices, particularly software that or regulatory and business responses to, intended negative
collects sensitive data and employs AI. The US Food and consequences (i.e. as overt or covert business objectives)
Drug Administration recently proposed a regulatory were not recognised.
framework for the use of AI and ML algorithms in IT ar- It is notable that with a few exceptions, IS research has
tefacts classified as Software as a Medical Device or SaMD heeded little to the negative affordances of IT artefacts
(FDA, 2019; Chhaya and Khambholja, 2021); However, posing rising risks to individuals and societal systems
‘regulators, such as the US FDA, the European Medicines (Mikalef et al., 2022). Take, for example, a recent paper by
Agency (EMA), and national competent authorities for Malhotra, Majchrzak, and Lyytinen (2021), which points
medical devices are working to figure out how to interpret, out the dearth of research on negative or constraining af-
apply, or modify their existing regulatory frameworks’ fordances of IS and the interdependencies and interactions
(Minssen et al., 2020, p. 1; cf. European Commission, between affordances. One may conclude that if the affor-
2021). The FDA and the EU’s European Medical dances are negative, and intentionally leveraged in pursuit
Agency (EMA) currently address the need to account for of business objectives, then such affordances may magnify
negative affordances and risks that SaMD presents (Ibid.). the risks – the whole being more than the sum of the parts. In
However, concerns have been raised as to the ability of considering Table 3, the interactions of negative affordances
regulators to address risks to data privacy, cybersecurity and between the different categories of IT artefacts, AI, quantum
accuracy or bias in AI-based SaMD (Cohen et al., 2020). In computing, and IoT are likely to pose significantly higher
2022, researchers concluded that: ‘Insufficient public systemic risks (Paech, Butler et al. 2019).
102 Journal of Information Technology 38(2)

Drawing on the findings of the papers in this issue and Jensen, Pierangelo Rosati, Susan Winter, Ping Wang, Rudy
our research, we posit that regulators and supervisory Hirschheim, M. Lynne Markus, David Tilson, Ben Eaton,
agencies across most industry sectors operate predomi- Michael zur Muehlen, Jing Tang, Mikhail Oet, Theo Lynn,
nantly in reactive mode and fail to anticipate the risks and Heiko Gewald, Selja Seppalla, Frantz Rowe, Pierangelo Rosati,
negative consequences of IT artefacts. As with the financial Shazia Sadiq.
industry, we wonder if there exists not only an information 2. FAANG is an acronym from Facebook (Meta), Apple, Amazon,
asymmetry between regulators and the regulated but also an Netflix, and Alphabet (formerly Google). GAFAM of Google,
expertise asymmetry concerning the understanding of the Apple, Facebook, Amazon, Microsoft, a group of major
risks and rewards of IT artefacts, particularly in the boards computing companies.
of corporations (Paech, Butler et al. 2019). Evidence also 3. https://www.dataprotection.ie/sites/default/files/uploads/2019-
suggests that policymakers are subject to techno- 11/Guidance_on_the_Principles_of_Data_Protection_Oct19.pdf
fundamentalism and a pro-IT innovation and business 4. https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en
bias (Orr, 1994, 1998). Accordingly, we believe that too 5. https://www.bankofengland.co.uk/-/media/boe/files/
much emphasis is paid to the positive affordances touted by prudential-regulation/letter/2021/september/thematic-findings-
the IT industry for their offerings and not enough consid- on-the-reliability-of-regulatory-returns.pdf
eration to their negative affordances and their consequences 6. https://www.bankofengland.co.uk/-/media/boe/files/
for society and the environment. These factors present prudential-regulation/letter/2022/january/artis-2022-priorities.
significant barriers that impede comprehensive, competent, pdf. [Accessed: 2022-11-06].
and effective institutional work to ensure that regulations
adequately protect individuals and society. Finally, due to its
multidisciplinary nature and unique socio-technical axis of References
cohesion in research perspectives, the IS field is uniquely
placed to help regulators, the regulated, and other stake- Akhigbe O, Amyot D and Richards G (2015) Information tech-
holders understand and address the critical issues and risks nology artifacts in the regulatory compliance of business
they and society face. The road ahead is complex and processes: a meta-analysis. In: International Conference on
challenging, but if IS research seeks to remain relevant to all E-Technologies. Cham: Springer, pp. 89–104.
stakeholders, it must critically challenge the taken-for- Akhigbe O, Amyot D, Mylopoulos J, et al. (2017) What can in-
granted assumptions regarding the negative affordances formation systems do for regulators? A review of the state-of-
and risks of the current and future generations of IT arte- practice in Canada. In: 2017 11th International Conference on
facts. We ask: Are IS researchers and IS journal editors Research Challenges in Information Science (RCIS). IEEE,
willing to take up this challenge? pp. 57–65.
Akhigbe O, Amyot D, Richards G, et al. (2021) GoRIM: a model-
driven method for enhancing regulatory intelligence. Soft-
Declaration of conflicting interests
ware and Systems Modeling, pp. 1–29.
The author(s) declared no potential conflicts of interest with re- Aven T (2011) On some recent definitions and analysis frame-
spect to the research, authorship, and/or publication of this article. works for risk, vulnerability and resilience. Risk Analysis
31(4): 515–522.
Funding Aven T (2015) The concept of antifragility and its implications for
The author(s) received no financial support for the research, au- the practice of risk analysis. Risk analysis 35(3): 476–483.
thorship, and/or publication of this article. Aven T (2017) How some types of risk assessments can support
resilience analysis and management. Reliability Engineering
ORCID iD & System Safety 167: 536–543.
Aven T (2019) The call for a shift from risk to resilience: What
Daniel Gozman  https://orcid.org/0000-0002-7399-9201
does it mean? Risk Analysis 39(6): 1196–1203.
Aven T and Renn O (2009) On risk defined as an event where the
Notes outcome is uncertain. Journal of risk research 12(1): 1–11.
1. We are grateful to the following colleagues who acted as re- Aven T, Ben-Haim Y, Boje Andersen H, et al. (2018) Society for
viewers: Stefan Haefliger, Jonas Hedman, Uri Gal, Silvia risk analysis glossary. In: Society for Risk Analysis. https://
Masiero, Eric Lim, Barney Tan, Roman Beck, Eva Micheler, www.sra.org/wp-content/uploads/2020/04/SRA-Glossary-
Jonathan Liebenau, Ganna Pogrebna, Michelle Kaarst-Brown, FINAL.pdf
Wendy Currie, Christian Kurtz, Michel Avital , Chris Parker, Bacalu F (2021) Digital policing tools as social control technol-
Stan Karanasios, Vladislav Fomin, Nicholas Berente, Sean ogies: data-driven predictive algorithms, automated facial
Hansen, Carsten Sørensen, Donna Iaculano, Francois de recognition surveillance, and law enforcement Biometrics.
Vaujany, John King, Matti Rossi, Charlie McElroy, Thomas Analysis and Metaphysics 20: 74–88.
Butler et al. 103

Baldwin R, Cave M and Lodge M (2011) Understanding reg- Butler T and Abi-Lahoud E (2014) A mechanism-based expla-
ulation: theory, strategy, and practice. Oxford university nation of the institutionalization of semantic technologies in
press. the financial industry. In: International Working Conference
Bamberger KA (2009) Technologies of compliance: risk and on Transfer and Diffusion of IT. Berlin, Heidelberg: Springer,
regulation in a digital age. Tex. L. Rev 88: 669. pp. 277–294.
BCBS (1989) Risks in Computer and Telecommunication Systems. Butler T and Brooks R (2021) Achieving operational resilience in
https://www.bis.org/publ/bcbsc136.htm the financial industry: Insights from complex adaptive sys-
BCBS (2001) Basel Committee on Banking Supervision. Working tems theory and implications for risk management. Journal of
Paper on the Regulatory Treatment of Operational Risk. Risk Management in Financial Institutions 14(4): 395–407.
Available at www.bis.org Butler T and McGovern D (2012) A conceptual model and IS
BCBS (2011) Principles for the Sound Management of Opera- framework for the design and adoption of environmental
tional Risk. Bank for International Settlements. https://www. compliance management systems. Information Systems
bis.org/publ/bcbs195.pdf Frontiers 14(2): 221–235.
BCBS (2020) Revisions to the principles for the sound manage- Butler T and O’Brien L (2019) Understanding RegTech for digital
ment of operational risk. https://www.bis.org/bcbs/publ/ regulatory compliance. In: Disrupting Finance. Cham: Pal-
d508.pdf grave Pivot, pp. 85–102.
BCBS (2004) Basel II Revised International Capital Framework. Butler T and Hackney R (2021) The role of informational
https://www.bis.org/publ/bcbsca.htm mechanisms in the adoption of Green IS to achieve eco-
Bendale A, Patel N, Damahe DP, et al. (2011) Computer software sustainability in municipalities. Information & Management
validation in pharmaceuticals. Asian Journal of Pharma- 58(3): 103320.
ceutical Sciences and Clinical Research 1(2): 27–39. Bygrave LA (2017) Data protection by design and by default:
Bennett WL (2021) Killing the golden goose? A framework for deciphering the EU’s legislative requirements. Oslo Law
regulating disruptive technologies. Information, Communi- Review 4(2): 105–120.
cation & Society, pp. 1–21. Callon M and Muniesa F (2005) Peripheral vision economic
Bjørnsen K and Aven T (2019) Risk aggregation: What does it markets as calculative collective devices. Organization
really mean? Reliability Engineering & System Safety 191: Studies 26(8): 1229–1250.
106524. Chang SY (2022). Towards detection of AI-generated texts and
Blauth TF, Gstrein OJ and Zwitter A (2022) Artificial intelligence misinformation. In Socio-Technical Aspects in Security: 11th
crime: an overview of malicious use and abuse of AI. IEEE International Workshop, STAST 2021, Virtual Event. (p. 194).
Access 10: 77110–77122. Springer Nature.
Bosschaerts A and Lio G (2022) Increased focus on operational Cheng CY, Chien MS and Lee CC (2021) ICT diffusion, financial
resilience. Journal of Securities Operations & Custody 14(4): development, and economic growth: an international cross-
319–328. country analysis. Economic modelling 94: 662–671.
Broeders D and Prenio J (2018) Innovative technology in financial Chhaya V and Khambholja K (2021) The SaMD regulatory
supervision (SupTech): the experience of early users. In: FSI landscape in the US and Europe. Regulatory Focus. Regu-
Insights on policy implementation. Financial Stability Insti- latory Focus, Regulatory Affairs Professionals Society: 1–10.
tute, Bank for International Settlements. Ciborra C (2006) Imbrication of representations: risk and digital
Burgemeestre B, Hulstijn J and Tan YH (2009) Rule-based versus technologies. Journal of Management Studies 43(6):
principle-based regulatory compliance. In: Legal Knowledge 1339–1356.
and Information Systems. IOS Press, pp. 37–46. Clark DD and Claffy KC (2015) Anchoring policy development
Büthe T, Djeffal C, Lütge C, et al. (2022) Governing AI–at- around stable points: an approach to regulating the co-evolving
tempting to herd cats? Introduction to the special issue on the ICT ecosystem. Telecommunications Policy 39(10): 848–860.
governance of artificial intelligence. Journal of European Clarke R (2022) Research opportunities in the regulatory aspects of
Public Policy 29(11): 1–32. electronic markets. Electronic Markets 32(1): 179–200.
Butler T (2011) Compliance with institutional imperatives on Clark-Ginsberg A and Slayton R (2019) Regulating risks within
environmental sustainability: building theory on the role of complex sociotechnical systems: evidence from critical in-
Green IS. The Journal of Strategic Information Systems frastructure cybersecurity standards. Science and Public
20(1): 6–26. Policy 46(3): 339–346.
Butler T (2012) Regulating green IT: laws, standards, and pro- Clemons EK and Wilson J (2018) The future of academic research
tocols. In: San M and Gangadharan GR (eds), Harnessing in information systems economics: from information systems
green IT: Principles and Practices. Wiley, pp. 297–341. and strategy to innovative business models, social impacts,
Butler T (2017) Towards a standards-based technology architec- public policy, regulation, and the law. In: Proceedings of the
ture for RegTech. Journal of Financial Transformation 45(1): 51st Hawaii International Conference on System Sciences,
49–59. Waikoloa Village, Hawaii, pp. 5232–5241.
104 Journal of Information Technology 38(2)

Cohen IG, Evgeniou T, Gerke S, et al. (2020) The European and trust. https://ec.europa.eu/info/sites/info/files/
artificial intelligence strategy: implications and challenges commissionwhitepaper-artificial-intelligence-feb2020_en.
for digital health. The Lancet Digital Health 2(7): pdf
e376–e379. European Commission (2003) Communication from the Com-
Colangelo A, Gross F and Schuster F (2021) Effective measure- mission to the Council and the European Parliament -
ment of the economy in the emerging digital age. In Pro- Modernising Company Law and Enhancing Corporate
ceedings 63rd ISI World Statistics Congress (p. 16). Governance in the European Union - A Plan to Move For-
Cordelia A (2007) E-government: towards the e-bureaucratic ward. https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=
form? Journal of Information Technology 22(3): 265–274. celex%3A52003DC0284
Crouhy M, Galai D and Mark R (2006) The essentials of risk Eyal N (2014) Hooked: How to build habit-forming products.
management. New York: McGraw-Hill. Penguin.
Culpepper PD and Thelen K (2020) Are we all Amazon primed? FDA (2019) Proposed regulatory framework for modifications to
Consumers and the politics of platform power. Comparative artificial intelligence/machine learning (AI/ML)-based soft-
Political Studies 53(2): 288–318. ware as a medical device (SaMD). Food and Drug
Currie WL, Gozman DP and Seddon JJ (2018) Dialectic tensions Administration.
in the financial markets: a longitudinal study of pre-and post- Feld H (2019) The case for the Digital Platform Act: Market
crisis regulatory technology. Journal of Information Tech- structure and regulation of digital platforms. Roosevelt
nology 33(4): 304–325. Institute.
Currie WL and Seddon JJM (2017) The regulatory, technology and Flew T and Gillett R (2021) Platform policy: evaluating different
market ‘dark arts trilogy’ of high frequency trading: a research responses to the challenges of platform power. Journal of
agenda. Journal of Information Technology 32(2): 111–126. Digital Media & Policy 12(2): 231–246.
Davidson E, Winter J and Chiasson M (2023) Investigating IT- Ford CL (2008) New governance, compliance, and principles-
based Regulation of Personal Health: Nudging, Mobile Apps based securities regulation. Am. Bus. LJ 45: 1.
and Data. Forthcoming: Journal of Information Technology. Gasparri G (2019) Risks and opportunities of RegTech and
De Reuver M, Sørensen C and Basole RC (2018) The digital SupTech developments. Frontiers in Artificial Intelligence 2:
platform: a research agenda. Journal of information tech- 1–4.
nology 33(2): 124–135. Gerke S, Babic B, Evgeniou T, et al. (2020) The need for a
De Vaujany FX, Fomin VV, Haefliger S, et al. (2018) Rules, system view to regulate artificial intelligence/machine
practices, and information technology: a trifecta of organi- learning-based software as medical device. NPJ digital
zational regulation. Information Systems Research 29(3): medicine 3(1): 1–4.
755–773. Gibson JJ (1986). The ecological approach to visual perception
Dickson J (2003) Configuring software for compliance with (Kindle edition). Hillsdale, NJ: Lawrence Erlbaum Associates.
21 CFR Part 11 audit trail requirements. Pharmaceutical Gleiss A, Pousttchi K and Degan K (2023) Identifying the
Technology Europe 15(11). patterns: towards a systematic approach to digital plat-
DiMaggio PJ and Powell WW (1983) The iron cage revisited: form regulation.
institutional isomorphism and collective rationality in orga- Gozman D and Currie W (2013) Building post crisis watchtowers:
nizational fields. American sociological review: 147–160. investment management systems and new institutional logics
Drozdowski P, Rathgeb C, Dantcheva A, et al. (2020) Demo- for regulatory compliance.
graphic bias in biometrics: a survey on an emerging chal- Gozman D and Currie W (2014) The role of investment man-
lenge. IEEE Transactions on Technology and Society 1(2): agement systems in regulatory compliance: a post-financial
89–103. crisis study of displacement mechanisms. Journal of Infor-
Ebrahimian S, Kalra MK, Agarwal S, et al. (2022) FDA- mation Technology 29(1): 44–58.
regulated AI algorithms: Trends, strengths, and gaps of Gozman D and Willcocks L (2019) The emerging cloud dilemma:
validation studies. Academic Radiology 29(4): 559–566. balancing innovation with cross-border privacy and out-
Edelman LB and Suchman MC (1997) The legal environments of sourcing regulations. Journal of Business Research 97:
organizations. Annual review of sociology: 479–515. 235–256.
European Commission (2020) Proposal for a REGULATION Gozman D, Liebenau J and Aste T (2020) A case study of using
OF THE EUROPEAN PARLIAMENT AND OF THE blockchain technology in regulatory technology. MIS
COUNCIL on digital operational resilience for the fi- Quarterly Executive 19(1): 19–37.
nancial sector and amending Regulations (EC) No 1060/ Gupta S (2022) The interaction between technology, business
2009. https://eur-lex.europa.eu/legal-content/EN/TXT/ environment, society, and regulation in ICT industries. IIMB
PDF/?uri=CELEX:52020PC0595&from=EN Management Review.
European Commission (2021) European commission white paper Hari J (2022) Stolen Focus: Why You Can’t Pay Attention–and
on artificial intelligence–a European approach to excellence How to Think Deeply Again. Crown.
Butler et al. 105

Hawley J (2021) The Tyranny of Big Tech. Simon and Schuster. Lundvall BÅ and Borrás S (2005) Science, technology, and in-
Heidegger M (1954) The question concerning technology. Tech- novation policy. In: Fagerberg J, Mowery DC and Nelson RR
nology and values: Essential readings 99: 113. (2005) (eds), The Oxford handbook of innovation, Oxford
Henningsson S and Eaton B (2023) Governmental Regulation and University Press, 599-631.
Digital Infrastructure Innovation: The Mediating Role of Lyytinen K and Robey D (1999) Learning failure in information
Modular Architecture. Forthcoming: Journal of Information systems development. Information Systems Journal 9(2):
Technology. 85–101.
Hinings B, Gegenhuber T and Greenwood R (2018) Digital in- Lyytinen K, Mathiassen L and Ropponen J (1998) Attention
novation and transformation: an institutional perspective. shaping and software risk—a categorical analysis of four
Information and Organization 28(1): 52–61. classical risk management approaches. Information Systems
Hughes PJ (2021) Where Next for Operational Risk? A Guide for Research 9(3): 233–255.
Risk Managers and Accountants. Grosvenor House Pub- Majchrzak A and Markus M (2013) Technology Affordances and
lishing Ltd. Constraints Theory (of MIS). Thousand Oaks, CA: Sage
Itami H and Numagami T (1992) Dynamic interaction between Publications.
strategy and technology. Strategic Management Journal Malhotra A, Majchrzak A and Lyytinen K (2021) Socio-technical
13(S2): 119–135. affordances for large-scale collaborations: introduction to a
Jasmontaite L, Kamara I, Zanfir-Fortuna G, et al. (2018) Data virtual special issue. Organization Science 32(5): 1371–1390.
protection by design and by default: Framing guiding prin- Mansell R (2021) European responses to (US) digital platform
ciples into legal obligations in the GDPR. European. Data dominance. In: The Routledge handbook of digital media and
Protection Law Review 4: 168. globalization. Routledge, pp. 141–149.
Karanasios S, Kokshaguna O and Reinecke P (2023) To Regulate Mantelero A, Vaciago G, Samantha Esposito M, et al. (2020) The
or Not to Regulate: Unravelling Institutional Tussles Around common EU approach to personal data and cybersecurity
the Regulation of Algorithmic Control of Digital Platforms. regulation. International Journal of Law and Information
Forthcoming: Journal of Information Technology. Technology 28(4): 297–328.
Kates RW and Kasperson JX (1983) Comparative risk analysis of Mattli W (2019) Darkness by Design. Princeton: Princeton Uni-
technological hazards (a review). Proceedings of the National versity Press.
Academy of Sciences 80(22): 7027–7038. Mignerat M and Rivard S (2009) Positioning the institutional
Kim J and Yoo J (2019) Science and technology policy research in perspective in information systems research. Journal of In-
the EU: from Framework Programme to HORIZON 2020. formation Technology: Special Issue on Institutional Theory
Social Sciences 8(5): 153. in Information 24(4): 369–391.
Kirby M (2009) The fundamental problem of regulating tech- Mikalef P, Conboy K, Lundström JE and Popovič A (2022)
nology. Indian Journal of Law and Technology 5(1): 1–25. Thinking responsibly about responsible AI and ‘the dark
Korngiebel DM and Mooney SD (2021) Considering the possi- side’of AI. European Journal of Information Systems 31(3):
bilities and pitfalls of Generative Pre-trained Transformer 3 257–268.
(GPT-3) in healthcare delivery. NPJ Digital Medicine 4(1): 1–3. Minssen T, Gerke S, Aboy M, et al. (2020) Regulatory responses to
Kosseff J (2019) Cybersecurity law. John Wiley & Sons. medical machine learning. Journal of Law and the Biosci-
Latour B (2005) Reassembling the Social-An Introduction to ences 7(1): lsaa002.
Actor-Network-Theory. Oxford: Oxford University Press. Monkiewicz J (2022). Financial supervision in digital age: in-
Lawrence TB and Suddaby R (2006) Institutions and institutional novations and data abundance. In: Ga˛ siorkiewicz L and Jan
work. In: Clegg R, Hardy C, Lawrence TB, et al. (eds), M. (eds.), Digital Finance and the Future of the Global
Handbook of organization studies. 2nd edn. London: Sage, Financial System (pp. 213-225). Routledge.
pp. 21–254. Moqbel M and Kock N (2018) Unveiling the dark side of social
Leonardi PM (2011) When flexible routines meet flexible tech- networking sites: personal and work-related consequences of
nologies: affordance, constraint, and the imbrication of hu- social networking site addiction. Information and Manage-
man and material agencies. MIS Quarterly 35(1): 147–167. ment 55(1): 109–119.
Lindman J, Makinen J and Kasanen E (2023) Big Tech’s Power, Mousavi S and Gigerenzer G (2014) Risk, uncertainty, and heu-
Political Corporate Social Responsibility, and Regulation. ristics. Journal of Business Research 67(8): 1671–1678.
Forthcoming: Journal of Information Technology. Muniesa F, Millo Y and Callon M (2007) An Introduction to
Logan TM, Aven T, Guikema S, et al. (2021) The role of time in market devices. The Sociological Review 55(s2): 1–12.
risk and risk analysis: implications for resilience, sustain- Nitzberg M and Zysman J (2022) Algorithms, data, and platforms:
ability, and management. Risk Analysis: 1–12. the diverse challenges of governing AI. Journal of European
Lounsbury M, Steele CW, Wang MS, et al. (2021) New directions Public Policy: 1–26.
in the study of institutional logics: From tools to phenomena. Norris C (2005) From personal to digital: CCTV, the panopticon,
Annual Review of Sociology 47: 261–280. and the technological mediation of suspicion and social
106 Journal of Information Technology 38(2)

control. In: Surveillance as Social Sorting. Routledge, Scarantino A (2003) Affordances explained. Philosophy of science
pp. 263–295. 70(5): 949–961.
Omarova ST (2010) Wall street as community of fate: toward Schnurr D, Fast V and Wholfarth M (2023) Regulation of Data-
financial industry self-regulation. U. Pa. L. Rev 159: 411. driven Market Power in the Digital Economy: Business Value
Orbach B (2012) What is regulation? Yale Journal on Regulation Creation and Competitive Advantages from Big Data.
Online 30(1): 1–10. Forthcoming: Journal of Information Technology.
Orlikowski WJ and Iacono CS (2001) Research commentary: Schueler J and Ostler T (2016) Biopharmaceutical startup’s need of
desperately seeking the “IT” in IT research—A call to the- regulatory intelligence. Journal of Commercial Biotechnol-
orizing the IT artifact. Information systems research 12(2): ogy 22(1).
121–134. Scott WR (2005) Institutional theory: Contributing to a theoretical
Orlikowski WJ and Barley SR (2001) Technology and institutions: research program. Great minds in management: The process
what can research on information technology and research on of theory development 37(2): 460–484.
organisations learn from each other. MIS Quarterly 25(2): Senyo PK, Gozman D, Karanasios S, et al. (2022a) Moving away
145–166. from trading on the margins: economic empowerment of
Orr DW (1994) Technological fundamentalism. Conservation informal businesses through FinTech. Information Systems
Biology 8(2): 335–337. Journal.
Orr DW (1998) Technological fundamentalism. The Ecologist Senyo PK, Karanasios S, Gozman D, et al. (2022b) FinTech
28(6): 329–333. ecosystem practices shaping financial inclusion: the case of
mobile money in Ghana. European Journal of Information
Paech PT and Butler T (2019). Thirty recommendations on
Systems 31(1): 112–127.
regulation, innovation and finance. In: Expert Group on
Shuren J, Patel B and Gottlieb S (2018) FDA regulation of mobile
Regulatory Obstacles to Financial Innovation (ROFIEG).
medical apps. Jama 320(4): 337–338.
Available from: https://ec.europa.eu/info/publications/
Smith ML (2011) Limitations to building institutional trustwor-
191113-report-expert-group-regulatory-obstacles-financial-
thiness through e-government: a comparative study of two
innovation_en. (Accessed: 2022-01-08).
e-services in Chile. Journal of Information Technology 26(1):
Papazafeiropoulou A and Spanaki K (2016) Understanding gov-
78–93.
ernance, risk, and compliance information systems (GRC IS):
Studer R, Benjamins VR and Fensel D (1998) Knowledge engi-
The expert’s view. Information Systems Frontiers 18(6):
neering: principles and methods. Data & knowledge engi-
1251–1263.
neering 25(1-2): 161–197.
Papp R (2006) Information technology & FDA compliance in the
Tarafdar M, Gupta A and Turel O (2013) The dark side of in-
pharmaceutical industry. In: Cases on Telecommunications
formation technology use. Information Systems Journal
and Networking. IGI Global, pp. 280–291.
23(3): 269–275.
Parent M and Reich BH (2009) Governing information technology Tarbert HP (2019) Rules for Principles and Principles for Rules:
risk. California Management Review 51(3): 134–152. Tools for Crafting Sound Financial Regulation. Harvard
Penikas H (2015) History of banking regulation as developed by Bussiness Law Review Online, 10, 1.
the Basel Committee on Banking Supervision 1974-2014. Theisen TW and Neill CJ (2004) FDA regulations and auditing
Estabilidad financiera, pp. 9–47. practices for software suppliers at a pharmaceutical manu-
Power M (2005) The invention of operational risk. Review of facturer. Software Quality Professional 6(4): 14.
International Political Economy 12(4): 577–599. Thornton PH and Ocasio W (1999) Institutional logics and the
Prather-Kinsey J, Boyar S and Hood AC (2018) Implications for historical contingency of power in organizations: executive
IFRS principles-based and US GAAP rules-based applica- succession in the higher education publishing industry, 1958–
tions: are accountants’ decisions affected by work location 1990. American journal of Sociology 105(3): 801–843.
and core self-evaluations? Journal of International Ac- Tomalin M (2022) Rethinking online friction in the information society.
counting, Auditing and Taxation 32: 61–69. Journal of Information Technology: 02683962211067812.
Preda A. (2007) The sociological approach to financial markets. Troitiño DR and Kerikmäe T (2021) Europe facing the digital
Journal of Economic Surveys 21(3): 506–533. challenge: obstacles and solutions. IDP. Revista de Internet,
Rainer RK, Snyder CA and Carr HH (1991) Risk analysis for Derecho y Polı́tica, (34), 1–3.
information technology. Journal of Management information Ullrich C (2018) A risk-based approach towards infringement
systems 8(1): 129–147. prevention on the internet: adopting the anti-money laun-
Renn O (2017) Risk governance: coping with uncertainty in a dering framework to online platforms. International Journal
complex world. Routledge. of Law and Information Technology 26(3): 226–251.
Sama LM and Shoaf V (2005) Reconciling rules and principles: an Volz KG and Gigerenzer G (2012) Cognitive processes in deci-
ethics-based approach to corporate governance. Journal of sions under risk are not the same as in decisions under un-
Business Ethics 58(1): 177–185. certainty. Frontiers in Neuroscience 6: 105.
Butler et al. 107

Ward J (2022) The Loop: How Technology is Creating a World research focuses on risks that technologies pose to society,
Without Choices and How to Fight Back. Hachette Books. particularly operational and cybersecurity risks in business
Washington AL (2018) How to argue with an algorithm: lessons organisations. Tom was awarded over €8.7m in research
from the COMPAS-ProPublica debate. Colo. Tech. LJ 17: funding and authored 226 publications, which include 81
131. full papers, 84 conference papers, and 11 inventions.
Wessel RA (2019) Cybersecurity in the European Union: Resil-
Dr. Daniel Gozman is an Associate Professor at the Uni-
ience through regulation? In: The Routledge Handbook of
versity of Sydney Business School and an Honorary Fellow
European Security Law and Policy. Routledge, pp. 283–300.
at Henley Business School at the University of Reading,
Wiener JB (2004) The regulation of technology, and the tech-
UK. Daniel received his PhD from the London School of
nology of regulation. Technology in Society 26(2-3):
Economics. He is a Research Fellow at UCL’s Centre for
483–500.
Blockchain Technologies and a member of the Worshipful
World Economic Forum (2022) The Global Risks Report 2022.
Company of Information Technologists (Livery Company
17th edn. Cologny, Switzerland: World Economic Forum.
of the City of London). He has previously published in the
Wright J (2021) Suspect AI: Vibraimage, emotion recognition technology
Journal of Management Information Systems, Management
and algorithmic opacity. Science, Technology and Society 1: 20.
Information Systems Quarterly Executive, Journal of
Zaloom C (2003) Ambiguous numbers: trading technologies and
Business Research and Small Business Economics. Daniel is
interpretation in financial markets. American Ethnologist
a Senior Editor for the Journal of Information Technology
30(2): 258–272.
and an Associate Editor for European Journal of Infor-
Zammuto RF, Griffith TL, Majchrzak A, et al. (2007) Information
mation Systems, Information Systems Journal and Elec-
Technology and the Changing Fabric of Organization. Or-
tronic Commerce and Research Applications. Currently, his
ganization Science 18(5): 749–762.
work focuses on the intersection between policy, emergent
Zuboff S (2020) You are now remotely controlled. New York
technology and innovation. Daniel has acted as an academic
Times, p. 24.
advisor to international law firms, analyst groups and global
Zuboff S (1985) Automate/informate: the two faces of intelligent
technology firms. Prior to academia, Daniel worked for
technology. Organizational Dynamics 14(2): 5–18.
Accenture, Deloitte and various banks providing consulting
Zuboff S (2015) Big other: surveillance capitalism and the
advice.
prospects of an information civilization. Journal of infor-
mation technology 30(1): 75–89. Kalle Lyytinen (PhD, Computer Science, University of
Jyvaskylä; Dr. h.c. mult) is Distinguished University Pro-
Author biography fessor at Case Western Reserve University and a distin-
Dr Tom Butler is Professor of Information Systems and guished visiting professor at Aalto University, Finland. He
Regulatory Technologies at the Department of Business is among the top five IS scholars in terms of his h-index
Information Systems, Cork University Business School, (96); he has the highest network centrality among the IS
UCC. As Principal Investigator of Ireland's Governance scholars. He AIS Fellow (2004) and the LEO Award re-
Risk and Compliance Technology Centre (GRCTC), Tom cipient (2013), and the former chair of IFIP WG 8.2 “In-
led a multidisciplinary team of knowledge engineers, in- formation systems and organizations”. He has published
formation systems and legal researchers conducting re- over 400 refereed articles and edited or written over 30
search and development (R&D) on AI-based technologies books or special issues. He has won best paper awards from
to enable global financial institutions to manage better AoM, AIS/ICIS and other societies and served as SE or
regulatory compliance and operational risk. As a member of editor to all IS journals and several leading organization
the Expert Group on Regulatory Obstacles Financial In- theory and innovation journals. He conducts research on
novation (ROFIEG) at the European Commission's DG digital innovation and its dynamics and organizing, com-
FISMA, he helped guide EU policy on the regulation of IT plex design work, requirements in large systems, and
in the financial industry. In a broader context, Tom's emergence and growth of digital infrastructures.

You might also like