Selected Papers from the Australasian Conference on Information Systems (ACIS) 2019

2021-04-06

Preface to Special Section of Invited Papers from the 30th Australasian Conference on Information Systems Deborah Bunker, Annette Mills, Doug Vogel
doi: https://doi.org/10.3127/ajis.v25i0.3449

The Coevolution of Routines and IT Systems in IT-enabled Organizational Transformation as an Instance of Digital Transformation: A Social Constructivist Perspective
Faqir Taj,Karlheinz Kautz,Vince Bruno
[email protected]
doi: https://doi.org/10.3127/ajis.v25i0.2855

This paper proposes a conceptual framework to study the phenomenon of IT-enabled Organizational Transformation (IT-enabled OT) as a coevolution process of organizational routines and a new IT system. The framework’s objective is to understand IT-enabled OT in a holistic and integrated manner by investigating how actors perceive, interpret, appropriate, and enact, the new IT system in their work routines as well as how they align the new system and these routines with the social order and structures of the organization. It allows the examination of the reciprocal interactions between different aspects of organizational routines and a new IT system to enhance the understanding of how change unfolds in an organization during the implementation, the adoption, use, and adaptation of a new IT system. We illustrate the scope, the analytic and conceptual strength of the framework with a number of examples from the literature and, lastly, discuss its ontological positioning. The paper concludes with a call for further research to empirically validate and refine the proposed framework.

#ITenabledOT #organizationalroutines #coevolution #appropriation #enactment

Compliance with security guidelines in teenagers: the conflicting role of peer influence and personal norms
Florence Mwagwabi, Jhee Hee Jiow
[email protected]
doi: https://doi.org/10.3127/ajis.v25i0.2953

What drives teenagers to comply with computer password guidelines? Using an extended form of protection motivation theory (PMT) (Rogers, 1983), we found that even if teenage computer users believe they are susceptible to being hacked, or that being hacked would be detrimental, it has no bearing on their password choices. Other motives outside of PMT also drive teenage security behaviour. Personal norms fully mediate the relationship between the perceived severity of threat and compliance intentions such that perceived severity is not sufficient to encourage compliance. Teenagers must actually feel obligated to comply. While personal norms may encourage compliance, concerns about feeling embarrassed or ashamed if their social media accounts are hacked into actually encourages compliance. On the other hand, peer influence, such as the fear of being teased about someone hacking into their account, discourages compliance. Our study contributes to understanding early security practices and highlights potential differences between adult and teenage behaviours to consider in future studies. For example, our findings suggest that password security guidelines alone will not suffice to ensure teenage compliance; they may need enforced password rules at the authentication level to eliminate any opportunity to violate password rules. Our study will benefit children and parents as well as organizations that have changed work practices to enable employees to work from home, but which places children in danger of clicking on malicious links on their parents’ computers. To our knowledge, this is the first password security study that applies PMT to examine computer-based security behaviours in teenagers.

#protectionmotivationtheory #PMT #teenagecybersecuritybehaviour #compliancebehavioursinteenagers #passwordcomplianceintention #socialmediapasswordpractices #peerinfluence #personalnorms #anticipatedguilt #anticipatedembarrassment?

Decision Support Systems in the Context of Cyber-Physical Systems: Influencing Factors and Challenges for the Adoption in Production Scheduling
Pascal Freier, Matthias Schumann
[email protected]
doi: https://doi.org/10.3127/ajis.v25i0.2849

Cyber-physical systems promise a complete networking of all actors and resources involved in production and thus an improved availability of information. In this context decision support systems enable appropriate processing and presentation of the captured data. In particular, production scheduling could benefit from this, since it is responsible for the short-term planning and control of released orders. Since decision support systems and cyber-physical systems together are not yet widely used in production scheduling, the aim of this research study is to analyse the adoption of these technologies. In order to do so, we conducted a qualitative interview study with experts on production scheduling. Thereby, we identified eleven influencing factors and 22 related challenges, which affect the adoption of decision support systems in production scheduling in the context of cyber-physical systems. We further discuss and assess the identified influencing factors based on the interview study. The results help to explain and improve the adoption of those systems and can serve as a starting point for their development.

#decisionsupportsystem #productionscheduling #cyberphysicalsystems #industry40 #challenges

A Conceptual Tool to Eliminate Filter Bubbles in Social Networks
Alireza Amrollahi
[email protected]
doi: https://doi.org/10.3127/ajis.v25i0.2867

Reliance on social media as a source of information has lead to several challenges, including the limitation of sources to viewers’ preferences and desires, also known as filter bubbles. The formation of filter bubbles is a known risk to democracy. It can bring negative consequences like polarisation of the society, users’ tendency to extremist viewpoints and the proliferation of fake news. Previous studies have focused on specific aspects and paid less attention to a holistic approach for eliminating the notion. The current study, however, aims to propose a model for an integrated tool that assists users in avoiding filter bubbles in social networks. To this end, a systematic literature review has been undertaken, and initially, 571 papers in six top-ranked scientific databases have been identified. After excluding irrelevant studies and performing an in-depth analysis of the remaining papers, a classification of research studies is proposed. This classification is then used to introduce an overall architecture for an integrated tool that synthesises all previous studies and offers new features for avoiding filter bubbles. The study explains the components and features of the proposed architecture and concludes with a list of implications for the recommended tool.

#filterbubble #socialnetworks #prescriptivestudy #informationbubble

Intelligent agent based framework to augment warehouse management systems for dynamic demand environments
Tania Binos, Vince Bruno,Arthur Adamopoulos
[email protected]
doi: https://doi.org/10.3127/ajis.v25i0.2845

Warehouses are being impacted by increasing e-commerce and omni-channel commerce. The design of current WMSs (Warehouse Management Systems) may not be suitable to this mode of operation. The golden rule of material handling is smooth product flow, but there are day-to-day operational issues that occur in the warehouse that can impact this and order fulfilment, resulting in disruptions. Standard operational process is paramount to warehouse operational control but may preclude a dynamic response to real-time operational constraints. The growth of IoT (Internet of Things) sensor and data analytics technology provide new opportunities for designing warehouse management systems that detect and reorganise around real-time constraints to mitigate the impact of day-to-day warehouse operational issues. This paper presents the design and development stage of a design science methodology of an intelligent agent framework for basic warehouse management systems. This framework is distributed, is structured around operational constraints and includes the human operator at operational and decision support levels. An agent based simulation was built to demonstrate the viability of the framework.

#warehousemanagementsystems #distributedintelligence #softwareagents #decisionsupport