Australasian Journal of Information Systems 2024-01-29T21:15:52-08:00 Professor Karlheinz Kautz Open Journal Systems <p>The <cite>Australasian Journal of Information Systems</cite> (AJIS) is an international quality, peer reviewed journal covering innovative research and practice in Information Systems. It is an open access journal which does not levy any publication fees.</p> <div>&nbsp;</div> <div>&nbsp;</div> <div>&nbsp;</div> What prevents organisations from achieving e-HRM potential? 2023-09-04T00:38:17-07:00 Arnela Ceric Kevin Parton <p class="References" style="margin-left: 0cm; text-indent: 0cm;">Use of electronic human resource management (e-HRM) offers the prospect of enabling the human resource management (HRM) function to take on a strategic partner’s role in organisations. Despite the pervasive expansion of e-HRM use, there is no clear understanding of why organisations are not achieving e-HRM potential. We address this issue by investigating e-HRM adoption factors and their influence on information technology (IT) use potential to automate, informate and transform the HRM function in a sequential manner. In particular, we examine HRM professionals’ experiences with e-HRM use, including challenges, successes, and outcomes. We identified e-HRM adoption factors that enable and that constrain each stage of e-HRM use. With a focus on the inhibiting factors, our findings suggest that e-HRM potential hindered already in the automation stage diminishes e-HRM potential to subsequently informate and to transform the e-HRM function.</p> 2024-01-29T00:00:00-08:00 Copyright (c) 2024 Arnela Ceric, Kevin Parton Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework 2023-10-19T15:53:35-07:00 Jia Xu Humza Naseer Sean Maynard Justin Filippou <p>Organisations are increasingly practising business analytics to generate actionable insights that can guide their digital business transformation. Transforming business digitally using business analytics is an ongoing process that requires an integrated and disciplined approach to leveraging analytics and promoting collaboration. An emerging business analytics practice, Data Operations (DataOps), provides a disciplined approach for organisations to collaborate using analytical information for digital business transformation. We propose a conceptual framework by reviewing the literature on business analytics, DataOps and organisational information processing theory (OIPT). This conceptual framework explains how organisations can employ DataOps as an integrated and disciplined approach for developing the analytical information processing capability and facilitating boundary-spanning activities required for digital business transformation. This research (a) extends current knowledge on digital transformation by linking it with business analytics from the perspective of OIPT and boundary-spanning activities, and (b) presents DataOps as a novel approach for using analytical information for digital business transformation.</p> 2024-01-29T00:00:00-08:00 Copyright (c) 2024 Jia Xu, Humza Naseer, Sean Maynard, Justin Filippou Mobile Identity Protection: The Moderation Role of Self-Efficacy 2023-11-09T13:17:48-08:00 Yasser Alhelaly Gurpreet Dhillon Tiago Oliveira <p class="References" style="margin-left: 0cm; text-indent: 0cm;">The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting identity in a mobile environment is a problem. This study develops a model that examines the role of identity protection self-efficacy in increasing users’ motivation intentions to achieve actual mobile identity protection. Our research found that self-efficacy significantly affects the relationship between users’ perceived threat appraisal and their motivational intentions for identity protection. The relation between mobile users’ protection, motivational intentions, and actual mobile identity protection actions was also found to be significant. Additionally, the findings revealed the considerable impact of awareness in fully mediating between self-efficacy and actual identity protection. The model and its hypotheses are empirically tested through a survey of 383 mobile users, and the findings are validated through a panel of experts, thus confirming the impact of self-efficacy on an individual’s identity protection in the mobile context.</p> 2024-01-29T00:00:00-08:00 Copyright (c) 2024 Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliviera Doing Big Things in a Small Way: A Social Media Analytics Approach to Information Diffusion During Crisis Events in Digital Influencer Networks 2023-09-02T08:29:27-07:00 Shohil Kishore Amy Errmann <p>Digital influencers play an essential role in determining information diffusion during crisis events. This paper demonstrates that information diffusion (retweets) on the social media platform Twitter (now X) highly depends on digital influencers’ number of followers and influencers’ location within communication networks. We show (study 1) that there is significantly more information diffusion in regional (vs. national or international) crisis events when tweeted by micro-influencers (vs. meso- and macro-influencers). Further, study 2 demonstrates that this pattern holds when micro-influencers operate in a local location (are located local to the crisis). However, effects become attenuated when micro-influencers are situated in a global location (outside of the locality of the event). We term this effect ‘influencer network compression’ – the smaller in scope a crisis event geography (regional, national, or international) and influencer location (local or global) becomes, the more effective micro-influencers are at diffusing information. This shows that those who possess the most followers (meso- and macro-influencers) are less effective at attracting retweets than micro-influencers situated local to a crisis. As online information diffusion plays a critical role during public crisis events, this paper contributes to both practice and theory by exploring the role of digital influencers and their network geographies in different types of crisis events.</p> 2024-01-28T00:00:00-08:00 Copyright (c) 2024 Shohil Kishore, Amy Errmann