Accounting for Unintended Consequences in IS Research: A Call to Action
DOI:
https://doi.org/10.3127/ajis.v29.6063Keywords:
Unintended consequences, unexpected outcomes, unanticipated consequences, digital transformation, IT governanceAbstract
Unintended consequences in Information Systems (IS) research are typically examined only after they have surfaced in practice, often treated as isolated instances rather than being systematically identified and understood. This reactive stance constrains our ability to anticipate risks, recognize emerging opportunities, and build cumulative insights across studies. To assess the current state of IS research on unintended consequences, we conducted a scoping review of literature in the Association for Information Systems' Senior Scholars' Basket of Journals. Our review highlights significant gaps in how unintended consequences are defined, theorized, and systematically compared. To address these gaps, we propose three foundational considerations: (1) conceptual clarity, to refine definitions and delineate boundaries; (2) relational configurations, to analyze the interplay between actors, technologies, and contexts; and (3) temporal configurations, to capture the evolving nature of consequences over time. Building on these dimensions, we introduce a set of guiding questions designed to provide shared analytical vocabulary rather than a prescriptive framework. These questions enable researchers to more systematically identify, categorize, and compare unintended consequences across contexts, thereby fostering theoretical precision, facilitating cross-contextual learning, and supporting a more anticipatory and comprehensive understanding of the phenomenon.
References
Alter, S. (2014). Theory of workarounds. Communications of the Association for Information Systems, 34(55), 1041–1066. doi.org/10.17705/1CAIS.03455
Baert, P. (1991). Unintended consequences: A typology and examples. International Sociology, 6(2), 201–210. doi.org/10.1177/026858091006002006
Bailey, D. E., Faraj, S., Hinds, P. J., Leonardi, P. M., & von Krogh, G. (2022). We are all theorists of technology now: A relational perspective on emerging technology and organizing. Organization Science, 33(1), 1–18. doi.org/10.1287/orsc.2021.1562
Benbya, H., & McKelvey, B. (2006). Using coevolutionary and complexity theories to improve IS alignment: A multi–level approach. Journal of Information Technology, 21(4), 284–298. doi.org/10.1057/palgrave.jit.2000080
Benbya, H., Nan, N., Tanriverdi, H., & Yoo, Y. (2020). Complexity and information systems research in the emerging digital world. MIS Quarterly, 44(1), 1–17. doi.org/10.25300/MISQ/2020/13304
Benbya, H., Pachidi, S., & Jarvenpaa, S. (2021). Artificial Intelligence in organizations: Implications for Information Systems Research. Journal of the Association for Information Systems, 22(2). doi.org/10.17705/1jais.00662
Benbya, H., & Melville, N. (2025). Fueling the potential of Artificial Intelligence for societal impact. MIS Quarterly Executive, 24(2). doi.org/10.17705/2msqe.2025.24.2.2
Benbya, H., Strich, F., & Tamm, T. (2024). Navigating generative Artificial Intelligence promises and perils for knowledge and creative work. Journal of the Association for Information Systems, 25(1), 23–36. doi.org/10.17705/1jais.00861
Bernardi, R., & Exworthy, M. (2020). Clinical managers' identity at the crossroad of multiple institutional logics in IT innovation: The case study of a health care organization in England. Information Systems Journal, 30(3), 566–595. doi.org/10.1111/isj.12267
Boudreau, M.-C., & Robey, D. (2005). Enacting integrated information technology: A human agency perspective. Organization Science, 16(1), 3–18. doi.org/10.1287/orsc.1040.0103
Bradbury, H., & Lichtenstein, B. M. B. (2000). Relationality in organizational research: Exploring the space between. Organization Science, 11(5), 551–564. doi.org/10.1287/orsc.11.5.551.15203
Califf, C. B., Sarker, S., & Sarker, S. (2020). The bright and dark sides of technostress: A mixed-methods study involving healthcare IT. MIS Quarterly, 44(2), 809–856. doi.org/10.25300/MISQ/2020/14818
Callon, M. (1998). An essay on framing and overflowing: Economic externalities revisited by sociology. The Sociological Review, 46(1_suppl), 244–269. doi.org/10.1111/j.1467-954X.1998.tb03477.x
Cecez-Kecmanovic, D., Kautz, K., & Abrahall, R. (2014). Reframing success and failure of information systems: A performative perspective. MIS Quarterly, 38(2), 561–588. doi.org/10.25300/MISQ/2014/38.2.11
de Zwart, F. (2015). Unintended but not unanticipated consequences. Theory and Society, 44(3), 283–297. doi.org/10.1007/s11186-015-9247-6
Fox, G., & Connolly, R. (2018). Mobile health technology adoption across generations: Narrowing the digital divide. Information Systems Journal, 28(6), 995–1019. doi.org/10.1111/isj.12179
Giermindl, L. M., Strich, F., Christ, O., Leicht-Deobald, U., & Redzepi, A. (2022). The dark sides of people analytics: Reviewing the perils for organisations and employees. European Journal of Information Systems, 31(3), 410–435. doi.org/10.1080/0960085X.2021.1927213
He, L., Luo, J., Tang, Y., Wu, Z., & Zhang, H. (2023). Motivating user-generated content: The unintended consequences of incentive thresholds. MIS Quarterly, 47(3), 1015–1044. doi.org/10.25300/MISQ/2022/17369
Hirschman, A. O. (1991). The rhetoric of reaction: Perversity, futility, jeopardy. Harvard University Press.
Jung, A.-K., Clausen, S., Franzke, A. S., & Marx, J. (2022). ‘Cambridge Moralica’ – towards an ethical framework for social media analytics. Australasian Journal of Information Systems, 26, Article 0. doi.org/10.3127/ajis.v26i0.3225
Kang, N., Ding, D., Van Riemsdijk, M. B., Morina, N., Neerincx, M. A., & Brinkman, W.-P. (2021). Self-identification with a virtual experience and its moderating effect on self-efficacy and presence. International Journal of Human–Computer Interaction, 37(2), 181–196. doi.org/10.1080/10447318.2020.1812909
Kumar, M., Singh, J. B., Chandwani, R., & Gupta, A. (2022). Locating resistance to healthcare information technology: A Bourdieusian analysis of doctors' symbolic capital conservation. Information Systems Journal, 32(2), 377–413. doi.org/10.1111/isj.12357
Kummer, T.-F., Recker, J., & Bick, M. (2017). Technology-induced anxiety: Manifestations, cultural influences, and its effect on the adoption of sensor-based technology in German and Australian hospitals. Information & Management, 54(1), 73–89. doi.org/10.1016/j.im.2016.04.002
Ma, L., Zhang, X., & Yu, P. (2023). Enterprise social media usage and social cyberloafing: An empirical investigation using the JD-R model. Internet Research, 34(3), 939–959. doi.org/10.1108/INTR-04-2021-0239
Magni, M., Ahuja, M. K., & Trombini, C. (2023). Excessive mobile use and family-work conflict: A resource drain theory approach to examine their effects on productivity and well-being. Information Systems Research, 34(1), 253–274. doi.org/10.1287/isre.2022.1121
Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2013). Analyzing the impact of HRIS implementations on HR personnel’s job satisfaction and turnover intention. The Journal of Strategic Information Systems, 22(3), 193–207. doi.org/10.1016/j.jsis.2012.09.001
Markus, M. L., & Robey, D. (1988). Information technology and organizational change: Causal structure in theory and research. Management Science, 34(5), 583–598. doi.org/10.1287/mnsc.34.5.583
Marjanovic, O., & Cecez-Kecmanovic, D. (2017). Exploring the tension between transparency and datification effects of open government IS through the lens of Complex Adaptive Systems. Journal of Strategic Information Systems, 26(3), 210–232. doi.org/10.1016/j.jsis.2017.07.001
Markus, M. L., & Robey, D. (2004). Why stuff happens: Explaining the unintended consequences of using IT. In K. V. Andersen & M. T. Vendelø (Eds.), The past and future of information systems (pp. 61–93). Elsevier Butterworth-Heinemann.
Merton, R. K. (1936). The unanticipated consequences of purposive social action. American Sociological Review, 1(6), 894–904. doi.org/10.2307/2084615
Merton, R. K. (1968). Social theory and social structure. Free Press.
Monod, E., Mayer, A. S., Straub, D., Joyce, E., & Qi, J. (2024). From worker empowerment to managerial control: The devolution of AI tools' intended positive implementation to their negative consequences. Information and Organization, 34(1), 100498. doi.org/10.1016/j.infoandorg.2023.100498
Nguyen, A., Rai, A., & Maruping, L. (2024). Understanding the unintended effects of human-machine moderation in addressing harassment within online communities. Journal of Management Information Systems, 41(2), 341–366. doi.org/10.1080/07421222.2024.2340831
Orlikowski, W. J. (1992). The duality of technology: Rethinking the concept of technology in organizations. Organization Science, 3(3), 398–427. doi.org/10.1287/orsc.3.3.398
Parks, R., Xu, H., Chu, C. H., & Lowry, P. B. (2017). Examining the intended and unintended consequences of organisational privacy safeguards. European Journal of Information Systems, 26(1), 37–65. https://doi.org/10.1057/ejis.2015.10
Petrakaki, D., Barber, N., & Waring, J. (2012). The possibilities of technology in shaping healthcare professionals: (Re/De-) professionalisation of pharmacists in England. Social Science & Medicine, 75(2), 429–437. doi.org/10.1016/j.socscimed.2012.03.039
Pienta, D., Thatcher, J. B., Wright, R. T., & Roth, P. L. (2024). An empirical investigation of the unintended consequences of vulnerability assessments leading to betrayal. Journal of the Association for Information Systems, 25(4), 1079–1116. doi.org/10.17705/1jais.00869
Rana, N. P., Chatterjee, S., Dwivedi, Y. K., & Akter, S. (2022). Understanding dark side of artificial intelligence (AI) integrated business analytics: Assessing firm’s operational inefficiency and competitiveness. European Journal of Information Systems, 31(3), 364–387. doi.org/10.1080/0960085X.2021.1955635
Robey, D., & Boudreau, M.-C. (1999). Accounting for the contradictory organizational consequences of information technology: Theoretical directions and methodological implications. Information Systems Research, 10(2), 167–185. doi.org/10.1287/isre.10.2.167
Rogers, E. M. (1983). Diffusion of innovations (3rd ed.). Free Press. (No DOI available; cite using ISBN: 9780029266502)
Rinta-Kahila, T., Someh, I., Gillespie, N., Indulska, M., & Gregor, S. (2022). Algorithmic decision-making and system destructiveness: A case of automatic debt recovery. European Journal of Information Systems, 31(3), 313–338. doi.org/10.1080/0960085X.2021.1960905
Sarker, S., Chatterjee, S., Xiao, X., & Elbanna, A. (2019). The sociotechnical axis of cohesion for the IS discipline: Its historical legacy and its continued relevance. MIS Quarterly, 43(3), 695–720. doi.org/10.25300/MISQ/2019/13747
Soliman, W., & Rinta-Kahila, T. (2020). Toward a refined conceptualization of IS discontinuance: Reflection on the past and a way forward. Information & Management, 57(2), 103167. doi.org/10.1016/j.im.2019.05.002
Trieu, V.-H., Burton-Jones, A., Green, P., & Cockcroft, S. (2022). Applying and extending the theory of effective use in a business intelligence context. MIS Quarterly, 46(1), 645–678. doi.org/10.25300/MISQ/2022/14880
Trocin, C., Lee, G., Bernardi, R., & Sarker, S. (2025). How do unintended consequences emerge from EHR implementation? An affordance perspective. Information Systems Journal, 35(1), 39–70. doi.org/10.1111/isj.12526
Walsham, G. (2012). Are we making a better world with ICTs? Reflections on a future agenda for the IS field. Journal of Information Technology, 27(2), 87–93. doi.org/10.1057/jit.2012.4
Watson, R. T., DeSanctis, G., & Poole, M. S. (1988). Using a computerized aid to support information systems development. MIS Quarterly, 12(1), 87–106. doi.org/10.2307/249019
Wolff, J. (2016). Perverse effects in defense of computer systems: When more is less. Journal of Management Information Systems, 33(2), 597–620. doi.org/10.1080/07421222.2016.1205934
Kim, Y., Ayvaci, M. U. S., Raghunathan, S., & Ayer, T. (2022). When IT creates legal vulnerability: Not just overutilization but under provisioning of health care could be a consequence. MIS Quarterly, 46(3), 1483–1515. doi.org/10.25300/MISQ/2022/16199
Zhao, L., Detlor, B., & Connelly, C. E. (2016). Sharing knowledge in social Q&A sites: The unintended consequences of extrinsic motivation. Journal of Management Information Systems, 33(1), 70–100. doi.org/10.1080/07421222.2016.1172459
Zhou, J., Zhang, Q., Zhou, S., Li, X., & Zhang, X. M. (2023). Unintended emotional effects of online health communities: A text mining-supported empirical study. MIS Quarterly, 47(1), 195–226. doi.org/10.25300/MISQ/2022/17018
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Hind Benbya, Franz Strich, Van-Hau Trieu

This work is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
AJIS publishes open-access articles distributed under the terms of a Creative Commons Non-Commercial and Attribution License which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and AJIS are credited. All other rights including granting permissions beyond those in the above license remain the property of the author(s).