skip to main content
10.1145/3361570.3361582acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicistConference Proceedingsconference-collections
research-article

Organising Low-budget Information Systems to Create and Sustain Collective Action for Blood Donation

Published:24 March 2019Publication History

ABSTRACT

The study conveys the experience of two social entrepreneurs from Latin America at the early stages of their projects. Both entrepreneurships solve the problem of building a pool of recurrent blood donors. The research applies the Extended Case Method to reconstruct the theory of critical mass. The practical contribution is the identification of the general process followed by both cases. The narrative of the general process provides actionable advice for entrepreneurs willing to create and sustain a critical mass for social purposes, whereas the theoretical contribution is the identification of the roles played by two types of heterogeneity of endorsements.

References

  1. Adler, P. A., & Peter Adler. 1987. Membership roles in field research, Newbury Park, CA: SAGE Publications.Google ScholarGoogle Scholar
  2. Alter, Steven. 2013. "Work system theory: overview of core concepts, extensions, and challenges for the future." Journal of the Association for Information 14 (2): 72--121. Retrieved from https://aisel.aisnet.org/jais/vol14/iss2/1Google ScholarGoogle ScholarCross RefCross Ref
  3. Benjamin, Victor, Hsinchun Chen, and David Zimbra. 2014. "Bridging the virtual and real: the relationship between web content, linkage, and geographical proximity of social movements." Journal of the Association for Information Science and Technology 65 (11): 2210--2222. doi: http://doi.org/10.1002/asi.23113Google ScholarGoogle ScholarCross RefCross Ref
  4. Bennett, W. L., & Alexandra Segerberg. 2011. "Digital media and the personalization of collective action." Information, Communication & Society 14 (6): 770--799. doi: http://doi.org/10.1080/1369118X.2011.579141Google ScholarGoogle ScholarCross RefCross Ref
  5. Burawoy, M. 1998. "The Extended Case Method." Sociological Theory 16 (1): 4--33. doi: http://doi.org/10.1111/0735-2751.00040Google ScholarGoogle ScholarCross RefCross Ref
  6. Burton-Jones, A., E. R. McLean, and Emmanuel Monod. 2015. "Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit." European Journal of Information Systems 24 (6): 664--679. doi: https://doi.org/10.1057/ejis.2014.31Google ScholarGoogle ScholarCross RefCross Ref
  7. Department of Health, P. O. (2012), NORMA Oficial Mexicana NOM-253-SSA1--2012, Diario oficial de la federacion.Google ScholarGoogle Scholar
  8. Glaser, B. G., and A. L. Strauss. 1967. "Theoretical sampling." In The discovery of grounded theory: strategies for qualitative research: 45--77. Weidenfeld and Nicolson.Google ScholarGoogle Scholar
  9. Holcombe, R. G. 1997. "A theory of the theory of public goods." The Review of Austrian Economics 10 (1): 1--22. doi: http://doi.org/10.1007/BF02538141Google ScholarGoogle ScholarCross RefCross Ref
  10. Luo, H., Wenhong Luo, and Diane Strong. 2000. "Perceived critical mass effect on groupware acceptance." European Journal of Information Systems 9 (2): 91--103. doi: http://doi.org/10.1057/palgrave.ejis.3000358Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Louis, W. R. 2009. "Collective action-and then what?", Journal of Social Issues 65 (4): 727--748. doi: http://doi.org/10.1111/j.1540-4560.2009.01623.xGoogle ScholarGoogle ScholarCross RefCross Ref
  12. Marwell, G., P.E. Oliver, and Ralph Prahl. 1988. "Social networks and collective action: a theory of the critical mass. III." American Journal of Sociology 94 (3): 502--534. Retrieved from http://www.jstor.org/stable/2780252Google ScholarGoogle ScholarCross RefCross Ref
  13. Minister of Health, P. O. (2016), "National Comission of Blood", Gaceta Oficial de La República Bolivariana de Venezuela: 429.291.Google ScholarGoogle Scholar
  14. Monge, Peter. R., Janet Fulk, Michael E. Kalman, Andrew J. Flanagin, Claire Parnassa, and Suzanne Rumsey. 1998. "Production of collective action in alliance-based interorganizational communication and Information Systems." Organization Science 9 (3): 411--433. doi: http://doi.org/10.1287/orsc.9.3.411Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ohlemacher, T. 1996. "Bridging people and protest: social relays of protest groups against low-flying military jets in west Germany." Social Problems 43 (2): 197--218. doi: http://doi.org/10.2307/3096998Google ScholarGoogle ScholarCross RefCross Ref
  16. Oliver, P. E., and Gerald Marwell. 1988. "The paradox of group size in collective action: a theory of the critical mass. II." American Sociological Review 53 (1): 1--8. Retrieved from http://www.jstor.org/stable/2095728Google ScholarGoogle ScholarCross RefCross Ref
  17. Oliver, P. E., and Gerald Marwell. 2001. "Whatever happened to critical mass theory? a retrospective and assessment." Sociological Theory 19 (3): 292--311. doi: http://doi.org/10.1111/0735-2751.00142Google ScholarGoogle ScholarCross RefCross Ref
  18. Oliver, P. E., Gerald Marwell, and Ruy Teixeira, R. 1985. "A theory of the critical mass. I. Interdependence, group heterogeneity, and the production of collective action." American Journal of Sociology 91 (3): 522--556. Retrieved from http://www.jstor.org/stable/2780201Google ScholarGoogle ScholarCross RefCross Ref
  19. Prasarnphanich, P., and Christian Wagner. 2008. "Creating critical mass in collaboration systems: Insights from Wikipedia." 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies. IEEE: 126--130. doi: http://doi.org/10.1109/DEST.2008.4635185Google ScholarGoogle Scholar
  20. Prasarnphanich, P., and Christian Wagner. 2011. "Explaining the sustainability of digital ecosystems based on the Wiki model through critical-mass theory." IEEE Transactions on Industrial Electronics 58 (6): 2065--2072. doi: http://doi.org/10.1109/TIE.2009.2027248Google ScholarGoogle ScholarCross RefCross Ref
  21. Ragin, Charles C. 1994. "The Process of social research: Ideas and evidence." Chap 3 in Constructing social research: The Unity of Method. 55--76. Thousand Oaks, CA, US: Pine Forge Press.Google ScholarGoogle Scholar
  22. Saldaña, Johnny. 2016. The coding manual for qualitative researchers, London, Great Britain: SAGE Publications.Google ScholarGoogle Scholar
  23. The World Bank. 2016. Wold Bank Open Data, available at http://data.worldbank.org/Google ScholarGoogle Scholar
  24. United Nations, U. N. 2016. Sustainable Development Goals. Retrieved from http://www.un.org/sustainabledevelopment/sustainable-development-goals/Google ScholarGoogle Scholar
  25. Van Slyke, Craig, Virginia Ilie, How Lou, and Thomas Stafford. 2007. "Perceived critical mass and the adoption of a communication technology." European Journal of Information Systems 16 (3): 270--283. doi: http://doi.org/10.1057/palgrave.ejis.3000680Google ScholarGoogle ScholarCross RefCross Ref
  26. WHO, W. H. O. 2010. "Towards 100% Voluntary Blood Donation: A Global Framework for Action", Geneva. Retrieved from http://www.who.int/bloodsafety/publications/9789241599696_eng.pdf?ua=1Google ScholarGoogle Scholar
  27. WHO, W. H. O. 2017. WHO mortality database, Available at http://apps.who.int/healthinfo/statistics/mortality/whodpms/Google ScholarGoogle Scholar
  28. Young, A. G. 2017. "Using ICT for social good: Cultural identity restoration through emancipatory pedagogy." Information Systems Journal: 1--19. doi: http://doi.org/10.1111/isj.12142Google ScholarGoogle Scholar
  29. Young, Dennis R., and Jesse D. Lecy. 2014. "Defining the universe of social enterprise: Competing metaphors." Voluntas 25 (5): 1307--1332. doi: http://doi.org/10.1007/s11266-013-9396-z.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICIST '19: Proceedings of the 9th International Conference on Information Systems and Technologies
    March 2019
    249 pages
    ISBN:9781450362924
    DOI:10.1145/3361570

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 24 March 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader