Accounting for Unintended Consequences in IS Research: A Call to Action

Authors

  • Hind Benbya
  • Franz Strich
  • Van-Hau Trieu

DOI:

https://doi.org/10.3127/ajis.v29.6063

Keywords:

Unintended consequences, unexpected outcomes, unanticipated consequences, digital transformation, IT governance

Abstract

Unintended consequences in Information Systems (IS) research are typically examined only after they have surfaced in practice, often treated as isolated instances rather than being systematically identified and understood. This reactive stance constrains our ability to anticipate risks, recognize emerging opportunities, and build cumulative insights across studies. To assess the current state of IS research on unintended consequences, we conducted a scoping review of literature in the Association for Information Systems' Senior Scholars' Basket of Journals. Our review highlights significant gaps in how unintended consequences are defined, theorized, and systematically compared. To address these gaps, we propose three foundational considerations: (1) conceptual clarity, to refine definitions and delineate boundaries; (2) relational configurations, to analyze the interplay between actors, technologies, and contexts; and (3) temporal configurations, to capture the evolving nature of consequences over time. Building on these dimensions, we introduce a set of guiding questions designed to provide shared analytical vocabulary rather than a prescriptive framework. These questions enable researchers to more systematically identify, categorize, and compare unintended consequences across contexts, thereby fostering theoretical precision, facilitating cross-contextual learning, and supporting a more anticipatory and comprehensive understanding of the phenomenon.

References

Alter, S. (2014). Theory of workarounds. Communications of the Association for Information Systems, 34(55), 1041–1066. doi.org/10.17705/1CAIS.03455

Baert, P. (1991). Unintended consequences: A typology and examples. International Sociology, 6(2), 201–210. doi.org/10.1177/026858091006002006

Bailey, D. E., Faraj, S., Hinds, P. J., Leonardi, P. M., & von Krogh, G. (2022). We are all theorists of technology now: A relational perspective on emerging technology and organizing. Organization Science, 33(1), 1–18. doi.org/10.1287/orsc.2021.1562

Benbya, H., & McKelvey, B. (2006). Using coevolutionary and complexity theories to improve IS alignment: A multi–level approach. Journal of Information Technology, 21(4), 284–298. doi.org/10.1057/palgrave.jit.2000080

Benbya, H., Nan, N., Tanriverdi, H., & Yoo, Y. (2020). Complexity and information systems research in the emerging digital world. MIS Quarterly, 44(1), 1–17. doi.org/10.25300/MISQ/2020/13304

Benbya, H., Pachidi, S., & Jarvenpaa, S. (2021). Artificial Intelligence in organizations: Implications for Information Systems Research. Journal of the Association for Information Systems, 22(2). doi.org/10.17705/1jais.00662

Benbya, H., & Melville, N. (2025). Fueling the potential of Artificial Intelligence for societal impact. MIS Quarterly Executive, 24(2). doi.org/10.17705/2msqe.2025.24.2.2

Benbya, H., Strich, F., & Tamm, T. (2024). Navigating generative Artificial Intelligence promises and perils for knowledge and creative work. Journal of the Association for Information Systems, 25(1), 23–36. doi.org/10.17705/1jais.00861

Bernardi, R., & Exworthy, M. (2020). Clinical managers' identity at the crossroad of multiple institutional logics in IT innovation: The case study of a health care organization in England. Information Systems Journal, 30(3), 566–595. doi.org/10.1111/isj.12267

Boudreau, M.-C., & Robey, D. (2005). Enacting integrated information technology: A human agency perspective. Organization Science, 16(1), 3–18. doi.org/10.1287/orsc.1040.0103

Bradbury, H., & Lichtenstein, B. M. B. (2000). Relationality in organizational research: Exploring the space between. Organization Science, 11(5), 551–564. doi.org/10.1287/orsc.11.5.551.15203

Califf, C. B., Sarker, S., & Sarker, S. (2020). The bright and dark sides of technostress: A mixed-methods study involving healthcare IT. MIS Quarterly, 44(2), 809–856. doi.org/10.25300/MISQ/2020/14818

Callon, M. (1998). An essay on framing and overflowing: Economic externalities revisited by sociology. The Sociological Review, 46(1_suppl), 244–269. doi.org/10.1111/j.1467-954X.1998.tb03477.x

Cecez-Kecmanovic, D., Kautz, K., & Abrahall, R. (2014). Reframing success and failure of information systems: A performative perspective. MIS Quarterly, 38(2), 561–588. doi.org/10.25300/MISQ/2014/38.2.11

de Zwart, F. (2015). Unintended but not unanticipated consequences. Theory and Society, 44(3), 283–297. doi.org/10.1007/s11186-015-9247-6

Fox, G., & Connolly, R. (2018). Mobile health technology adoption across generations: Narrowing the digital divide. Information Systems Journal, 28(6), 995–1019. doi.org/10.1111/isj.12179

Giermindl, L. M., Strich, F., Christ, O., Leicht-Deobald, U., & Redzepi, A. (2022). The dark sides of people analytics: Reviewing the perils for organisations and employees. European Journal of Information Systems, 31(3), 410–435. doi.org/10.1080/0960085X.2021.1927213

He, L., Luo, J., Tang, Y., Wu, Z., & Zhang, H. (2023). Motivating user-generated content: The unintended consequences of incentive thresholds. MIS Quarterly, 47(3), 1015–1044. doi.org/10.25300/MISQ/2022/17369

Hirschman, A. O. (1991). The rhetoric of reaction: Perversity, futility, jeopardy. Harvard University Press.

Jung, A.-K., Clausen, S., Franzke, A. S., & Marx, J. (2022). ‘Cambridge Moralica’ – towards an ethical framework for social media analytics. Australasian Journal of Information Systems, 26, Article 0. doi.org/10.3127/ajis.v26i0.3225

Kang, N., Ding, D., Van Riemsdijk, M. B., Morina, N., Neerincx, M. A., & Brinkman, W.-P. (2021). Self-identification with a virtual experience and its moderating effect on self-efficacy and presence. International Journal of Human–Computer Interaction, 37(2), 181–196. doi.org/10.1080/10447318.2020.1812909

Kumar, M., Singh, J. B., Chandwani, R., & Gupta, A. (2022). Locating resistance to healthcare information technology: A Bourdieusian analysis of doctors' symbolic capital conservation. Information Systems Journal, 32(2), 377–413. doi.org/10.1111/isj.12357

Kummer, T.-F., Recker, J., & Bick, M. (2017). Technology-induced anxiety: Manifestations, cultural influences, and its effect on the adoption of sensor-based technology in German and Australian hospitals. Information & Management, 54(1), 73–89. doi.org/10.1016/j.im.2016.04.002

Ma, L., Zhang, X., & Yu, P. (2023). Enterprise social media usage and social cyberloafing: An empirical investigation using the JD-R model. Internet Research, 34(3), 939–959. doi.org/10.1108/INTR-04-2021-0239

Magni, M., Ahuja, M. K., & Trombini, C. (2023). Excessive mobile use and family-work conflict: A resource drain theory approach to examine their effects on productivity and well-being. Information Systems Research, 34(1), 253–274. doi.org/10.1287/isre.2022.1121

Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2013). Analyzing the impact of HRIS implementations on HR personnel’s job satisfaction and turnover intention. The Journal of Strategic Information Systems, 22(3), 193–207. doi.org/10.1016/j.jsis.2012.09.001

Markus, M. L., & Robey, D. (1988). Information technology and organizational change: Causal structure in theory and research. Management Science, 34(5), 583–598. doi.org/10.1287/mnsc.34.5.583

Marjanovic, O., & Cecez-Kecmanovic, D. (2017). Exploring the tension between transparency and datification effects of open government IS through the lens of Complex Adaptive Systems. Journal of Strategic Information Systems, 26(3), 210–232. doi.org/10.1016/j.jsis.2017.07.001

Markus, M. L., & Robey, D. (2004). Why stuff happens: Explaining the unintended consequences of using IT. In K. V. Andersen & M. T. Vendelø (Eds.), The past and future of information systems (pp. 61–93). Elsevier Butterworth-Heinemann.

Merton, R. K. (1936). The unanticipated consequences of purposive social action. American Sociological Review, 1(6), 894–904. doi.org/10.2307/2084615

Merton, R. K. (1968). Social theory and social structure. Free Press.

Monod, E., Mayer, A. S., Straub, D., Joyce, E., & Qi, J. (2024). From worker empowerment to managerial control: The devolution of AI tools' intended positive implementation to their negative consequences. Information and Organization, 34(1), 100498. doi.org/10.1016/j.infoandorg.2023.100498

Nguyen, A., Rai, A., & Maruping, L. (2024). Understanding the unintended effects of human-machine moderation in addressing harassment within online communities. Journal of Management Information Systems, 41(2), 341–366. doi.org/10.1080/07421222.2024.2340831

Orlikowski, W. J. (1992). The duality of technology: Rethinking the concept of technology in organizations. Organization Science, 3(3), 398–427. doi.org/10.1287/orsc.3.3.398

Parks, R., Xu, H., Chu, C. H., & Lowry, P. B. (2017). Examining the intended and unintended consequences of organisational privacy safeguards. European Journal of Information Systems, 26(1), 37–65. https://doi.org/10.1057/ejis.2015.10

Petrakaki, D., Barber, N., & Waring, J. (2012). The possibilities of technology in shaping healthcare professionals: (Re/De-) professionalisation of pharmacists in England. Social Science & Medicine, 75(2), 429–437. doi.org/10.1016/j.socscimed.2012.03.039

Pienta, D., Thatcher, J. B., Wright, R. T., & Roth, P. L. (2024). An empirical investigation of the unintended consequences of vulnerability assessments leading to betrayal. Journal of the Association for Information Systems, 25(4), 1079–1116. doi.org/10.17705/1jais.00869

Rana, N. P., Chatterjee, S., Dwivedi, Y. K., & Akter, S. (2022). Understanding dark side of artificial intelligence (AI) integrated business analytics: Assessing firm’s operational inefficiency and competitiveness. European Journal of Information Systems, 31(3), 364–387. doi.org/10.1080/0960085X.2021.1955635

Robey, D., & Boudreau, M.-C. (1999). Accounting for the contradictory organizational consequences of information technology: Theoretical directions and methodological implications. Information Systems Research, 10(2), 167–185. doi.org/10.1287/isre.10.2.167

Rogers, E. M. (1983). Diffusion of innovations (3rd ed.). Free Press. (No DOI available; cite using ISBN: 9780029266502)

Rinta-Kahila, T., Someh, I., Gillespie, N., Indulska, M., & Gregor, S. (2022). Algorithmic decision-making and system destructiveness: A case of automatic debt recovery. European Journal of Information Systems, 31(3), 313–338. doi.org/10.1080/0960085X.2021.1960905

Sarker, S., Chatterjee, S., Xiao, X., & Elbanna, A. (2019). The sociotechnical axis of cohesion for the IS discipline: Its historical legacy and its continued relevance. MIS Quarterly, 43(3), 695–720. doi.org/10.25300/MISQ/2019/13747

Soliman, W., & Rinta-Kahila, T. (2020). Toward a refined conceptualization of IS discontinuance: Reflection on the past and a way forward. Information & Management, 57(2), 103167. doi.org/10.1016/j.im.2019.05.002

Trieu, V.-H., Burton-Jones, A., Green, P., & Cockcroft, S. (2022). Applying and extending the theory of effective use in a business intelligence context. MIS Quarterly, 46(1), 645–678. doi.org/10.25300/MISQ/2022/14880

Trocin, C., Lee, G., Bernardi, R., & Sarker, S. (2025). How do unintended consequences emerge from EHR implementation? An affordance perspective. Information Systems Journal, 35(1), 39–70. doi.org/10.1111/isj.12526

Walsham, G. (2012). Are we making a better world with ICTs? Reflections on a future agenda for the IS field. Journal of Information Technology, 27(2), 87–93. doi.org/10.1057/jit.2012.4

Watson, R. T., DeSanctis, G., & Poole, M. S. (1988). Using a computerized aid to support information systems development. MIS Quarterly, 12(1), 87–106. doi.org/10.2307/249019

Wolff, J. (2016). Perverse effects in defense of computer systems: When more is less. Journal of Management Information Systems, 33(2), 597–620. doi.org/10.1080/07421222.2016.1205934

Kim, Y., Ayvaci, M. U. S., Raghunathan, S., & Ayer, T. (2022). When IT creates legal vulnerability: Not just overutilization but under provisioning of health care could be a consequence. MIS Quarterly, 46(3), 1483–1515. doi.org/10.25300/MISQ/2022/16199

Zhao, L., Detlor, B., & Connelly, C. E. (2016). Sharing knowledge in social Q&A sites: The unintended consequences of extrinsic motivation. Journal of Management Information Systems, 33(1), 70–100. doi.org/10.1080/07421222.2016.1172459

Zhou, J., Zhang, Q., Zhou, S., Li, X., & Zhang, X. M. (2023). Unintended emotional effects of online health communities: A text mining-supported empirical study. MIS Quarterly, 47(1), 195–226. doi.org/10.25300/MISQ/2022/17018

Downloads

Published

2025-10-14

How to Cite

Benbya, H., Strich, F., & Trieu, V.-H. (2025). Accounting for Unintended Consequences in IS Research: A Call to Action. Australasian Journal of Information Systems, 29. https://doi.org/10.3127/ajis.v29.6063

Issue

Section

Provocation