Australasian Journal of Information Systems https://journal.acs.org.au/index.php/ajis <p>The <cite>Australasian Journal of Information Systems</cite> (AJIS) is an international quality, peer reviewed journal covering innovative research and practice in Information Systems. It is an open access journal which does not levy any publication fees.</p> <div>&nbsp;</div> <div>&nbsp;</div> <div>&nbsp;</div> Australasian Association for Information Systems en-US Australasian Journal of Information Systems 1326-2238 <p>AJIS publishes open-access articles distributed under the terms of a Creative Commons Non-Commercial and Attribution License&nbsp;which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and AJIS are credited. All other rights including granting permissions beyond those in the above license remain the property of the author(s).</p> What prevents organisations from achieving e-HRM potential? https://journal.acs.org.au/index.php/ajis/article/view/3877 <p class="References" style="margin-left: 0cm; text-indent: 0cm;">Use of electronic human resource management (e-HRM) offers the prospect of enabling the human resource management (HRM) function to take on a strategic partner’s role in organisations. Despite the pervasive expansion of e-HRM use, there is no clear understanding of why organisations are not achieving e-HRM potential. We address this issue by investigating e-HRM adoption factors and their influence on information technology (IT) use potential to automate, informate and transform the HRM function in a sequential manner. In particular, we examine HRM professionals’ experiences with e-HRM use, including challenges, successes, and outcomes. We identified e-HRM adoption factors that enable and that constrain each stage of e-HRM use. With a focus on the inhibiting factors, our findings suggest that e-HRM potential hindered already in the automation stage diminishes e-HRM potential to subsequently informate and to transform the e-HRM function.</p> Arnela Ceric Kevin Parton Copyright (c) 2024 Arnela Ceric, Kevin Parton https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-29 2024-01-29 28 10.3127/ajis.v28.3877 Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework https://journal.acs.org.au/index.php/ajis/article/view/4215 <p>Organisations are increasingly practising business analytics to generate actionable insights that can guide their digital business transformation. Transforming business digitally using business analytics is an ongoing process that requires an integrated and disciplined approach to leveraging analytics and promoting collaboration. An emerging business analytics practice, Data Operations (DataOps), provides a disciplined approach for organisations to collaborate using analytical information for digital business transformation. We propose a conceptual framework by reviewing the literature on business analytics, DataOps and organisational information processing theory (OIPT). This conceptual framework explains how organisations can employ DataOps as an integrated and disciplined approach for developing the analytical information processing capability and facilitating boundary-spanning activities required for digital business transformation. This research (a) extends current knowledge on digital transformation by linking it with business analytics from the perspective of OIPT and boundary-spanning activities, and (b) presents DataOps as a novel approach for using analytical information for digital business transformation.</p> Jia Xu Humza Naseer Sean Maynard Justin Filippou Copyright (c) 2024 Jia Xu, Humza Naseer, Sean Maynard, Justin Filippou https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-29 2024-01-29 28 10.3127/ajis.v28.4215 Mobile Identity Protection: The Moderation Role of Self-Efficacy https://journal.acs.org.au/index.php/ajis/article/view/4397 <p class="References" style="margin-left: 0cm; text-indent: 0cm;">The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting identity in a mobile environment is a problem. This study develops a model that examines the role of identity protection self-efficacy in increasing users’ motivation intentions to achieve actual mobile identity protection. Our research found that self-efficacy significantly affects the relationship between users’ perceived threat appraisal and their motivational intentions for identity protection. The relation between mobile users’ protection, motivational intentions, and actual mobile identity protection actions was also found to be significant. Additionally, the findings revealed the considerable impact of awareness in fully mediating between self-efficacy and actual identity protection. The model and its hypotheses are empirically tested through a survey of 383 mobile users, and the findings are validated through a panel of experts, thus confirming the impact of self-efficacy on an individual’s identity protection in the mobile context.</p> Yasser Alhelaly Gurpreet Dhillon Tiago Oliveira Copyright (c) 2024 Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliviera https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-29 2024-01-29 28 10.3127/ajis.v28.4397 Doing Big Things in a Small Way: A Social Media Analytics Approach to Information Diffusion During Crisis Events in Digital Influencer Networks https://journal.acs.org.au/index.php/ajis/article/view/4429 <p>Digital influencers play an essential role in determining information diffusion during crisis events. This paper demonstrates that information diffusion (retweets) on the social media platform Twitter (now X) highly depends on digital influencers’ number of followers and influencers’ location within communication networks. We show (study 1) that there is significantly more information diffusion in regional (vs. national or international) crisis events when tweeted by micro-influencers (vs. meso- and macro-influencers). Further, study 2 demonstrates that this pattern holds when micro-influencers operate in a local location (are located local to the crisis). However, effects become attenuated when micro-influencers are situated in a global location (outside of the locality of the event). We term this effect ‘influencer network compression’ – the smaller in scope a crisis event geography (regional, national, or international) and influencer location (local or global) becomes, the more effective micro-influencers are at diffusing information. This shows that those who possess the most followers (meso- and macro-influencers) are less effective at attracting retweets than micro-influencers situated local to a crisis. As online information diffusion plays a critical role during public crisis events, this paper contributes to both practice and theory by exploring the role of digital influencers and their network geographies in different types of crisis events.</p> Shohil Kishore Amy Errmann Copyright (c) 2024 Shohil Kishore, Amy Errmann https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-28 2024-01-28 28 10.3127/ajis.v28.4429