Overview

  • My research (Google Scholar profile) has appeared in top-tier management journals of MIS Quarterly; Organization Science; Information Systems Research; and Harvard Business Review, as well as at international conferences sponsored by leading academic organizations, including the Academy of Management and the Association of Information Systems.

Here’s a bit more of that standard biographical information expected of an academic

Major Research Publications

Steven L. Johnson Steven L. Johnson

Multi-level view of Phishing Susceptibility

Why do employees remain susceptible to phishing attacks? We conceptualize the handling of phishing attempts as one of many information processing tasks employees encounter while fulfilling workplace responsibilities.

Read More
Steven L. Johnson Steven L. Johnson

Echo Chambers and Filter Bubbles

Echo chambers and filter bubbles are potent metaphors that encapsulate widespread public fear that the use of social media may limit the information that users encounter or consume online, thus failing to promote a shared experience of free-flowing information.

Read More
Steven L. Johnson Steven L. Johnson

Theory Building with Big Data

How should we adapt our research norms, traditions, and practices to reflect newfound data abundance? How can we leverage the availability of big data to generate cumulative and generalizable knowledge claims that are robust to threats to validity?

Read More
Steven L. Johnson Steven L. Johnson

Software Development

How should teams of experts working on knowledge-intensive projects be structured? Should they be hierarchical? Or will flexible, self-organized groups perform better?

Read More
Steven L. Johnson Steven L. Johnson

Online Leadership

We find that beyond communication network position—in terms of formal role, centrality, membership in the core, and boundary spanning—those viewed as leaders by other participants, post a large number of positive, concise posts with simple language familiar to other participants.

Read More
Steven L. Johnson Steven L. Johnson

Network Exchange Patterns

Network exchange patterns in online community communication networks are characterized by direct reciprocity and indirect reciprocity patterns and, surprisingly, a tendency away from preferential attachment.

Read More
Steven L. Johnson Steven L. Johnson

Online Community Participation

Because virtual communities are perpetuated through voluntary contributions, the persistent peripheral participation of lurkers is sometimes viewed negatively as social loafing or free-riding. Alternatively, an individual may engage in legitimate peripheral participation when their passive monitoring of group activities educates, socializes and otherwise prepares them for more effective contribution.

Read More