Australasian Journal of Information Systems 2020-11-23T18:20:53-08:00 Assoc Prof John Lamp Open Journal Systems <p>The <cite>Australasian Journal of Information Systems</cite> (AJIS) is an international quality, peer reviewed journal covering innovative research and practice in Information Systems.</p> The Impact of Service Delivery System Process and Moderating Effect of Perceived Value in Internet Banking Adoption 2020-01-07T07:39:36-08:00 Rajiv Kumar Amit Sachan Ritu Kumar <p>This study identifies the impact of Internet banking service delivery system (IBSDS) process on consumer behaviour; the mediating effect of customer satisfaction on the relationship between IBSDS process and behavioural intention; and the moderating effect of the customer’s perceived value. The study uses a quantitative method using the data collected from 416 respondents. Mediated regression is used to examine the mediating effect of customer satisfaction. SPSS Process v2.16.3 is employed to analyse the moderating effect of the perceived value. The results indicate that IBSDS process impacts customer satisfaction and behavioural intention. Further, customer satisfaction plays a partial mediating role between the association of IBSDS process and behavioural intention. This study provides evidence that the technological capabilities embedded in the bank website processes are an important factor in determining customer satisfaction and ultimately behavioural intention. The study also reveals that perceived value moderates the relationship between IBSDS process and customer satisfaction, and between customer satisfaction, and, behavioural intention. It also adds to the existing knowledge on the adoption of Internet banking literature. Academicians and information systems researchers may use these findings for further research. Financial service providers or related agencies may consider the attributes of the IBSDS process (e.g., navigation, searching, transacting, etc.) while designing their Internet banking services to provide enhanced customer experiences. The paper also highlights the research limitations and scope for future research.</p> 2020-01-06T00:00:00-08:00 Copyright (c) 2020 Rajiv Kumar, Amit Sachan, Ritu Kumar Telemedicine Healthcare Service Adoption Barriers in Rural Bangladesh 2020-01-27T16:39:33-08:00 Khondker Mohammad Zobair Louis Sanzogni Kuldeep Sandhu <p class="JnlBody">This article investigates potential barriers to telemedicine adoption in centres hosted by rural public hospitals in Bangladesh. Little is known of the barriers related to telemedicine adoption in this context. Analysis of data collected from rural telemedicine patients identified seven broad categories of barriers: lack of organisational effectiveness, information and communication technology infrastructure, quality of care, allocation of resources, health staff motivation, patient satisfaction and trustworthiness. Their significance is explored. This research is based on the quantitative analysis of a data set of 500 telemedicine patients, from rural areas in Bangladesh. A conceptual model showing the interaction of pre-determined classes of barriers was established and hypotheses set up and tested using partial least squares structural equation modelling. Exemplary barriers to telemedicine adoption were identified and confirmed (p&lt;.01) namely, lack of organisational effectiveness, health staff motivation, patient satisfaction, and trustworthiness collectively explaining 62% of the variance in barriers to adoption and providing for the first-time empirical support of their existence. These barriers offer considerable resistance to the adoption and maintenance of current telemedicine projects in rural Bangladesh. Further, lack of information and communication technology infrastructure, allocation of resources and quality of care are indirect barriers affecting successful deployment of telemedicine in rural settings. These findings illuminate adoption impediments faced by existing telemedicine projects and institutionalise favourable policy guidelines to improve Bangladesh’s and similar emerging economies’ healthcare industries. Policy interventions and recommendations are provided, including current research limitations leading to opportunities for future research.</p> 2020-01-27T16:30:07-08:00 Copyright (c) 2020 Khondker Mohammad Zobair, Louis Sanjzogni, Kuldeep Sandhu Meta-design knowledge for Clinical Decision Support Systems 2020-04-06T19:35:16-07:00 Shah J Miah Jacqueline Blake Don Kerr <p class="JnlBody">Knowledge gained from a Decision Support Systems (DSS) design should ideally be reusable by DSS designers and researchers. The majority of existing DSS research has mainly focused on empirical problem solving rather than on developing principles that could inform solution approaches for other user contexts. Design Science Research (DSR) has contributed to effective development of various innovative DSS artefacts and associated knowledge development, but there has been limited progress on new knowledge development from a practical problem context, going beyond product and process descriptions. For DSS applications such as Clinical Decision Support Systems (CDSS) design and development, relevant reusable prescriptive knowledge is of significance not only to understand mutability but also to extend application of theory across domains. In this paper, we develop new design knowledge abstracted from the approach taken in a representative case of innovative CDSS development, specified as an architecture and six design principles. The CDSS design artefact was initially designed for a specific clinical need is shown to be flexible for meeting demands of knowledge production both for diagnosis and treatment. It is argued that the proposed general strategy is applicable to designing CDSS artefacts in similar problem domains representing an important contribution of design knowledge both in DSS and DSR fields.</p> 2020-04-06T17:24:01-07:00 Copyright (c) 2020 Shah J Miah, Jacqui Blake, Don Kerr, John Gammack The Impact of Ambivalent Perception of Bureaucratic Structure on Cyberloafing 2020-04-13T21:48:14-07:00 Prakriti Soral Jithesh Arayankalam Jatin Pandey <p class="JnlBody">Cyberloafing, defined as the use of the Internet for personal use at the workplace, is emerging as a serious concern for organizations as it disrupts the attainment of organizational objectives. A systematic literature review, conducted as a part of this research, of antecedents of cyberloafing behaviour show that research exploring the relationship between the perception of organizational structure and cyberloafing is at a nascent stage. Acknowledging the underexplored state of research in this area, we investigated this relationship through a quantitative study using a sample of 201 employees, and the containment theory as the base. Our study results indicate that an ambivalent perception of the bureaucratic structure has a differential impact on the cyberloafing activities through serial mediation of two important attitudes, namely organizational identification and work engagement. Theoretical and practical implications are also discussed.</p> 2020-04-13T21:45:04-07:00 Copyright (c) 2020 Prakriti Soral, A Jithesh, Jatin Pandey Computing, Girls and Education: What we need to know to change how girls think about information technology. 2020-04-15T17:14:00-07:00 Catherine Lang Julie Fisher Annemieke Craig Helen Forgasz <p>Despite significant efforts and many intervention programs over the years to encourage girls to study computing, we continue to see a declining interest. Girls’ lack of engagement with technology at school is resulting in fewer women entering the Information Technology (IT) workforce. Our research investigated whether a long-term intervention program with a specifically designed school-based curriculum could change girls’ minds about computing generally and increase their confidence and interest in an IT career. Qualitative and quantitative data were collected from girls and teachers before, during, and after this program was implemented. A conceptual model of the school-based influences on girls’ attitude was developed from the literature and used to explore the data. Findings from this four-year project added rich insights and resulted in a comprehensive model of ‘Factors that Influence Girls’ Attitude to IT.’&nbsp; This research demonstrates that a carefully designed IT curriculum, delivered in single-sex classes, reinforced by opportunities to interact with role models, and timetabled in regular class time, can and does change girls’ attitudes to IT. We also found that the students reported improved confidence and increased interest in IT. We posit that our refined model of ‘Factors that Influence Girls’ Attitude to IT’ is a valuable reference tool. Teachers, academics and professionals who are implementing programs to promote IT to girls can use it.</p> 2020-04-15T17:11:43-07:00 Copyright (c) 2020 Catherine Lang Digital Coupon Redemption: Conceptualization, Scale Development and Validation 2020-04-20T23:26:23-07:00 Preeti Nayal Neeraj Pandey <p class="JnlBody">The purpose of this study is to develop a reliable and valid scale for measuring digital coupon redemption. The scale development process began with the grounded theory approach for item generation. This was followed by the development of a conceptual framework, item generation, initial reliability analysis, exploratory factor analysis and confirmatory factor analysis (CFA) based on primary data collected from 609 participants. For validating the scale, the CFA was repeated using data from 411 unique participants. Results from two independent surveys supported the proposed scale in terms of construct, convergent and discriminant validity. Survey study resulted in a 45-item digital coupon redemption scale. It also covers digital aspects such as intention to search, attitude toward internet searching, perceived risk, perceived convenience and personal innovativeness which were not covered in earlier promotion scales. This scale would assist marketers to maximize digital coupon redemption during their promotion campaigns. This is the first attempt to provide a comprehensive scale to measure digital coupon redemption in the marketing literature.</p> 2020-04-20T23:18:55-07:00 Copyright (c) 2020 Preeti Nayal, Neeraj Pandey Helping Yourself or Others? Motivation Dynamics for High-Performing Volunteers in GLAM Crowdsourcing 2020-05-18T19:54:19-07:00 Sultana Lubna Alam Ruonan Sun John Campbell <p>While most crowdsourcing (CS) cases in the literature focus on commercial organisations, little is known about volunteers’ motivation of initial and continued participation in not-for-profit CS projects and importantly, about how the motivations may change over time. It is vital to understand motivation and motivational dynamics in a not-for-profit context because a fundamental challenge for not-for-profit CS initiations is to recruit and keep volunteers motivated without any formal contract or financial incentives. To tackle this challenge, we explore high performing volunteers’ initial motivation for joining and sustaining with a GLAM (galleries, libraries, archives and museums) CS project. We situated our interpretive exploration in a case study of the Australian Newspapers CS project initiated by the National Library of Australia. Based on the case study, we found that high-performing volunteers were motivated by a combination of personal, collective, and external factors classified into intrinsic, extrinsic, and internalised extrinsic motivations. Further, we found that these motivations changed over time. Specifically, many volunteers presented substantial personal (i.e., personal interest and fun) and community-centric motivations (i.e. altruism and non-profit cause) when they initially joined the project, whereas external motivations (i.e., recognition and rewards) had a greater impact on long-term participation. Our findings offer implications for CS system design (e.g., user profiles, tagging and commenting), incentive structure (e.g., reputation-based ranking, leader boards), and relational mechanisms (e.g., open communication channels) to stimulate sustainable contributions for not-for-profit CS initiatives.</p> 2020-05-18T19:51:30-07:00 Copyright (c) 2020 Sultana Lubna Alam, Ruonan Sun, John Campbell Research Directions in Information Systems Field, Current Status and Future Trends 2020-06-01T16:50:00-07:00 Elham Mazaheri Mohammad Lagzian Zahra Hemmat <p class="JnlBody">Information systems, as an emerging discipline which is dynamic and interdisciplinary, is constantly undergoing rapid changes; therefore, one of the most critical issues is to study the topics and methodological trends in this field. This study aimed to thoroughly investigate the topics and methodologies used in information system throughout a twelve-year period (2007-2018). In the present study, all the articles published in the top eight information system journals were investigated based on their topics and methodologies using a literature analysis approach, and the most common topics and methodologies in such studies were then detected. The main topics addressed in this field were electronic commerce/business, information system research, and IS usage/adoption, and the survey was the dominant research methodology in this regard. Furthermore, an increase in the use of the mathematical models indicates that more accurate quantitative research methods have made this field more mature. The research findings also show that the Internet of Things (IoT), big data, social media, bitcoin and block chain, digital transformation, sharing economy, digital platform, methodology of machine learning, data mining, and text mining are the main research topics and methods which should be further studied.</p> 2020-05-25T20:17:00-07:00 Copyright (c) 2020 Elham Mazaheri, mohammad lagzian, zahra hemmat Applying a Systematic Literature Review and Content Analysis Method to Analyse Open Source Developers’ Forking Motivation Interpretation, Categories and Consequences 2020-06-16T22:27:33-07:00 Bee Bee Chua Ying Zhang <p class="JnlBody">In open source (OS) environments, forking is a powerful social collaborative technique that creates a social coding community and increases code visibility but it has not been adopted by OS software (OSS) developers. This paper investigates OS forking divergence using contextual frameworks (systematic literature review and content analysis) to analyse OSS developer forking motivation, interpretation, categorisation and consequences. We identified five theoretical forking patterns: 1) forking can revive original project health; 2) few effective frameworks exist to describe project-to-project developer migration; 3) there is a literature on social forking community behaviour; 4) poor guidance is a threat to forking; and 5) most research uses mixed methods. We introduce guidelines for OSS communities to reduce organisational barriers to developer motivation and highlight the important of understanding developer forking. The challenge remains to analyse forking and sustainability from a social community perspective, particularly how programming language, file repositories and developer interest can predict forking motivation and behaviour for both novice OSS developers or experienced developers who want to improve forking performance.</p> 2020-06-16T00:00:00-07:00 Copyright (c) 2020 Bee Chua Investigating Information System Testing Gamification with Time Restrictions on Testers’ Performance 2020-07-06T22:16:07-07:00 Navid Memar Aneesh Krishna David McMeekin Tele Tan <p>This paper presents the results obtained from the evaluation of gamified software testing platform that was developed following series of focus group discussions comprising of software developers and testers. The purpose of this study is to understand the effect of gamification as an additive method that can help improve the performance of software testers. Additionally in this study, new metrics have been introduced to quantify the performance of software testers fairly and more accurately. Moreover, the effect of time restriction impacting on the performance of software testers will be discussed from results of this study. Findings suggest that the proposed metrics, which more accurately capture the difficulty level of the software code defects, are able to better analyse and compare the performances of software testers in the gamified testing environment. Moreover, results indicated that time restriction may compromise the performance of software testers and the quality of written software test code. On the other hand, results suggest that the performance of software testers in detecting low priority bugs in the gamified software-testing platform was better compared to the other more difficult to detect bugs.</p> 2020-07-06T22:13:59-07:00 Copyright (c) 2020 Navid Memar, Aneesh Krishna, David McMeekin, Tele Tan Improving Emergency Department Through Business Process Redesign 2020-07-14T16:44:23-07:00 Ruben Pereira Luís Velez Lapão Isaias Scalabrin Bianchi Daniel Amaral <p>The Emergency Departments (ED) of hospitals are poised for continuous improvement due to increasing demand. The ED are places where the efficiency of the services provided can save lives and therefore it should be seen as an area of maximum interest for process optimisation. This research aims at verifying if the application of Business Process Management (BPM) heuristics positively impacts the length of stay (LoS), without deteriorating the quality of the service provided. The methodology that underlies this research is a case study carried out in the ED of a public hospital. The data was gathered from individual interviews, focus groups, direct observation and document analysis. The BPM life cycle stages were followed. In addition, a simulation tool was used, and heuristics were chosen based on Devil’s Quadrangle theory. Three scenarios of the ED were considered. Additionally, three heuristics and any combination of them were also considered. Results show that heuristics positively impact the time variable without affecting the quality of the service, resulting in value gains for the patient. In terms of time consumption, the average LoS in the process was reduced by 22.5%, 15.9%, and 20.9% for each of the considered scenarios, while the maximum LoS was reduced by 29.2%, 36.2% % and 37.4%. Implications from these results were analysed. The novelty of this research is supported by the absence of studies applying BPM heuristics to ED. This research is a step forward to ally BPM heuristics and ED processes.</p> 2020-07-13T20:34:13-07:00 Copyright (c) 2020 Ruben Pereira , Luís Velez Lapão, Isaias Scalabrin Bianchi, Daniel Amaral Consumer acceptance and continuance of mobile money 2020-07-27T20:53:05-07:00 Abidin Alhassan Leon Li Krishna Reddy Geeta Duppati <p>This research provides empirical results on context-based factors that determine the use of mobile money in Africa by employing a unique secondary data which provides a new perspective on the technology acceptance model (TAM) application. The hypothesised research model tests the context-based constructs to determine how these constructs affect peoples' intentions and attitudes towards the continued use of mobile money. Exploring these constructs provides an understanding of the insights into the marketing campaigns and growth of mobile money providers. The empirical results suggest that the availability of electricity is an important factor for mobile phone functionality and ongoing use of mobile money in the long run. There is also a correlation between regulations that are perceived to be enabling and the intentions of individuals to continue using mobile money. However, there is a negative correlation between rural dwellings and the intentions of individuals to adopt the use of mobile money which finds its basis in the inadequate mobile networks and national grid systems in rural areas.</p> 2020-07-27T20:50:06-07:00 Copyright (c) 2020 Abidin Alhassan, Leon Li, Krishna Reddy, Geeta Duppati Dynamics of Digital Diffusion and Disadoption 2020-08-03T21:00:48-07:00 Boyd H Hunter Peter J Radoll <p>The digital divide between Indigenous and other Australians describes the unequal access to information and communications technology (ICT) between these groups. Historically, researchers have focused on acquiring new technology, but we argue that it is important to understand all the dynamics of digital usage, including the loss of access to ICT within a household. For long-lived technology such as internet access, it is particularly important to consider that retention of access to the technology. This paper conducts a longitudinal analysis of changes in internet usage for Indigenous and non-Indigenous Australian households using the Australian Census Longitudinal Dataset, 2006–2016. While earlier work analyses the digital divide in terms of ‘diffusion’ or adoption of ICT, this paper shows that the failure to retain internet access is also important in driving the digital divide. The dynamics of the digital divide have important and ongoing implications for addressing broader socioeconomic disadvantages experienced by Indigenous Australians. The COVID-19 pandemic underscores the urgency of policy addressing the digital divide, given the renewed momentum for remote learning and telecommuting.</p> 2020-08-03T20:58:35-07:00 Copyright (c) 2020 Boyd H Hunter, Peter J Radoll A Hyperconnected Smart City Framework 2020-08-25T19:05:05-07:00 Naureen Naqvi Sabih ur Rehman Zahidul Islam <p>Recent technological advancements have given rise to the concept of hyper-connected smart cities being adopted around the world. These cities aspire to achieve better outcomes for citizens by improving the quality of service delivery, information sharing, and creating a sustainable environment. A smart city comprises of a network of interconnected devices also known as IoT (Internet of Things), which captures data and transmits it to a platform for analysis. This data covers a variety of information produced in large volumes also known as Big Data. From data capture to processing and storage, there are several stages where a breach in security and privacy could result in catastrophic impacts. Presently there is a gap in the centralization of knowledge to implement smart city services with a secure architecture. To bridge this gap, we present a framework that highlights challenges within the smart city applications and synthesizes the techniques feasible to solve them. Additionally, we analyze the impact of a potential breach on smart city applications and state-of-the-art architectures available. Furthermore, we identify the stakeholders who may have an interest in learning about the relationships between the significant aspects of a smart city. We demonstrate these relationships through force-directed network diagrams. They will help raise the awareness amongst the stakeholders for planning the development of a smart city. To complement our framework, we designed web-based interactive resources that are available from</p> 2020-08-25T19:02:20-07:00 Copyright (c) 2020 Naureen Naqvi, Sabih ur Rehman, Zahidul Islam Implementing Data Strategy 2020-09-03T18:13:52-07:00 Radhakrishnan Balakrishnan Satyasiba Das Manojit Chattopadhyay <p>With the arrival of Big Data, organizations have started building data-enabled customer value propositions to increase monetizing and cost-saving opportunities. Organizations have to implement a set of guidelines, procedures, and processes to manage, process and transform data that could be leveraged for value creation. This study has approached the journey of an organization towards data-enabled value creation through four levels of data processing, such as data extraction, data transformation, value creation, and value delivery. This study has critical inferences on using data management solutions such as RDBMS, NoSQL, NewSQL, Big Data and real-time reporting tools to support transactional data in internal systems, and other types of data in external systems such as Social Media. The outcome of this study is a methodological technology independent data management framework an organization could use when building a strategy around data. This study provides guidelines for defining an enterprise-wide data management solution, helping both the academicians and practitioners.</p> 2020-09-03T18:10:09-07:00 Copyright (c) 2020 Radhakrishnan Balakrishnan, Satyasiba Das, Manojit Chattopadhyay The Role of Contextualization in Individuals’ Vulnerability to Phishing Attempts 2020-09-07T20:34:39-07:00 Farkhondeh Hassandoust Harminder Singh Jocelyn Williams <p>Hackers who engage in phishing manipulate their victims into revealing confidential information by exploiting their motives, habits, and cognitive biases. Drawing on heuristic-systematic processing and the anchoring effect, this study examines how the contextualization of phishing messages, in the form of modifications to their framing and content, affects individuals’ susceptibility to phishing. This study also investigates if there is a discrepancy between the way individuals believe they will react to phishing attempts and their actual reactions. Using two fake phishing campaigns and an online survey, we find that individuals are more susceptible to phishing attempts when the phishing messages they receive are specific to their context, thereby appealing to their psychological vulnerabilities. There is also a significant gap between how individuals believe they will react and their actual reactions to phishing attempts.</p> 2020-09-07T20:19:17-07:00 Copyright (c) 2020 Farkhondeh Hassandoust, Harminder Singh, Jocelyn Williams An integrated model combining ECM and UTAUT to explain users’ post-adoption behaviour towards mobile payment systems 2020-09-28T20:47:38-07:00 Sindhu Singh <p>Technological progression in mobile phones has increased the popularity of mobile payments. Users can shop online through a mobile device, which is time saving and convenient. Mobile payment systems involve ongoing interactions between users and payment providers. The initial acceptance of mobile payment systems has been studied extensively, but few studies have attempted to understand users’ post-adoption behaviour. This study employs an integrated model with the unified theory of acceptance and use of technology (UTAUT) framework and the expectation confirmation model (ECM), along with two additional constructs: perceived security and trust. The empirical results show that the integrated model has a higher predictive power to explain continuance intentions for using mobile payment systems with significant factors of satisfaction, trust, performance expectancy, and effort expectancy. This study confirmed that the UTAUT model could be extended to explain post-adoption behaviour towards mobile payment systems. The study’s findings have theoretical and practical value to further the understanding of pre- and post-adoption behaviour towards mobile payment systems.</p> 2020-09-28T20:44:15-07:00 Copyright (c) 2020 Sindhu Singh Does Consumers’ Intention to Purchase Travel Online Differ Across Generations? 2020-10-05T19:40:24-07:00 Shavneet Sharma Gurmeet Singh Stephen Pratt <p>This paper examines the differences in consumers' intention to purchase travel online across Millennials and Baby Boomers. The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is extended by including attitude, compatibility, innovativeness, perceived trust, and perceived risk variables. Data is collected using online questionnaires from Millennials (N=322) and Baby Boomers (N=318) in Australia. Overall, the empirical results revealed that factors affecting Australian consumers' intention to purchase travel online differ across generations. This study contributes to the literature by extending and testing the comprehensive research model to understand consumers' online travel purchase behavior better.</p> 2020-10-05T19:38:27-07:00 Copyright (c) 2020 Shavneet Sharma, Gurmeet Singh , Stephen Pratt Letting the public in 2020-10-14T19:49:01-07:00 Helen Hasan Henry Linger <p>Among the raft of information systems (IS) applications developed for use by local governments are those that attempt to introduce more open community engagement (CE) and facilitate e-democracy. In this paper, we report on a longitudinal study that reveals how the open nature of e-democracy challenges the practices of government bureaucracies. In 2012, we partnered with the Community Engagement Team of a Local Government Council in Australia, to study their planning for, and use of, IS for CE. Our study involved an action research intervention to gain a rich understanding of the contradictory demands of the bureaucratic imperative of the Council and the informal activities of the community. This was the first step of a longitudinal qualitative study of the Council’s e- democracy efforts over the ensuing seven years. Our analysis has been conducted through a dialectic lens, informed by the Cynefin sense-making framework. Our theoretical contribution is an e-Democracy Framework that incorporates the dialectic between the ordered environment of government and the community view that is ill-defined and unordered. As a practical contribution, government organisations can use the Framework to assess the current status of their CE and design a CE strategy to make interactions with civil society more meaningful.</p> 2020-10-14T19:47:33-07:00 Copyright (c) 2020 Helen Hasan, Henry Linger An Integrated Search Framework for Leveraging the Knowledge-Based Web Ecosystem 2020-10-19T19:02:18-07:00 Dengya Zhu Shastri Lakshman Nimmagadda Torsten Reiners Amit Rudra <p>The explosion of information constrains the judgement of search terms associated with Knowledge-Based Web Ecosystem (KBWE), making the retrieval of relevant information and its knowledge management challenging. The existing information retrieval (IR) tools and their fusion in a framework need attention, in which search results can effectively be managed. In this article, we demonstrate the effective use of information retrieval services by a variety of users and agents in various KBWE scenarios. An innovative Integrated Search Framework (ISF) is proposed, which utilises crawling strategies, web search technologies and traditional database search methods. Besides, ISF offers comprehensive, dynamic, personalized, and organization-oriented information retrieval services, ranging from the Internet, extranet, intranet, to personal desktop. In this empirical research, experiments are carried out demonstrating the improvements in the search process, as discerned in the conceptual ISF. The experimental results show improved precision compared with other popular search engines.</p> 2020-10-19T19:00:20-07:00 Copyright (c) 2020 Shastri Lakshman Nimmagadda The Evolving Nature of Information Systems Controls in Healthcare Organisations 2020-11-02T16:19:42-08:00 Deepak Saxena Joe McDonagh <p>Information Systems (IS) projects are found to be complex, unpredictable, and prone to time and cost overruns. Perhaps that is why organisations put a strong focus on IS controls during the planning and execution of such projects.IS control literature in the past has focussed on dyadic control relationships during an outsourced IS development project and relatively little is known about such controls during a complex enterprise systems project. Existing studies usually take a static view of IS controls and do not investigate how controls evolve during different phases of the system lifecycle, as well as across projects. This study presents a processual view of IS controls in the enterprise systems lifecycle in a national blood processing organisation. Traditional research in a blood banking context has focussed on optimising the process of blood collection, inventory management, and distribution with relatively limited attention to the implementation of the supporting information systems. This research focusses on the evolution of control based on a study of three enterprise system implementation projects in the case organisation. The study demonstrates that while all five control modes (input, outcome, behaviour, clan, and self-control) are applied across the phases of enterprise systems projects, the nature and extent of control mechanisms changes across the phases of the enterprise system lifecycle. The findings also suggest a teleological evolution of a project’s control portfolio in which the portfolio evolves based on adaptive learning processes from earlier projects. Finally, by exhibiting the influence of institutional and market context, this study also underlines the multi-stakeholder and contextual nature of enterprise systems implementation and associated controls in health service organisations.</p> 2020-10-26T19:55:56-07:00 Copyright (c) 2020 Deepak Saxena, Joe McDonagh Environmental Sustainability through Green Business Process Management 2020-11-17T17:53:07-08:00 Shahrzad Roohy Gohar Marta Indulska <p>The climate change phenomenon, directly or indirectly, affects industries and nations. Governments and organizations have been challenged to identify their environmental impacts to address environmental sustainability issues. A promising, yet under-studied in this context, theme of information systems (IS) literature that has the potential to help with identifying, quantifying and managing environmental impacts is business process management (BPM). With its focus on continual process performance improvement, the capacity of BPM to contribute to Environmental Sustainability (ES) needs to be further explored. Yet, contributions from the BPM research community and the impact of these contributions appear to be fragmented. In this paper, we present a systematic literature review to explore BPM contributions to ES, with a focus on environmental performance indicators (EPIs) as well as relevant organizational factors related to ES and BPM. In doing so, we identify and explore ‘Green BPM’ contributions and suggest ways to advance BPM research in the context of ES.</p> 2020-11-17T17:50:26-08:00 Copyright (c) 2020 Shahrzad Roohy Gohar, Marta Indulska Preface: Towards the Next Generation of Information Systems: Enhancing Traceability and Transparency 2020-05-11T20:02:16-07:00 Khin Than Win Ghassan Beydoun <p class="JnlBody">The information systems community plays a significant role in providing theories for guiding the creation of more effective information systems. This is nowadays most prominent in supporting the ongoing evolution of Artificial Intelligence (AI) and decision-making systems. As these systems are becoming increasingly reliable, and supplanting the presence of humans, the question of accountability and trust in these systems is increasingly coming to the fore. This editorial positions and showcases a collection of papers from the 2018 <em>Australasian Conference on Information Systems</em> within this context.</p> <p><em>&nbsp;</em></p> 2020-05-11T19:48:59-07:00 Copyright (c) 2020 Khin Than Win, Ghassan Beydoun Consumer Trust in Food Safety Requires Information Transparency 2020-05-11T20:02:16-07:00 Tri Khai Lam Jon Heales Nicole Hartley Chris Hodkinson This paper proposes a conceptual model to understand how information transparency matters can support consumer trust in food safety. Beside food labels, food product information can be disseminated by the support of technologies including traceability systems and social media. This article studies extant literature to provide a knowledge base for the development of a conceptual model. Information provided by traceability systems is deemed to increase a consumer’s knowledge of a food product. Furthermore, social media is considered as a well-informed source that provides some useful information to consumers. Therefore, we argue that technology-supported information supports and enhances the information consumers need to make their own judgement about the safety of a food product. Three testable propositions are developed from a conceptual model that provides insights into food information that consumers find helpful for developing trust in food safety. 2020-05-11T19:51:18-07:00 Copyright (c) 2019 Tri Khai Lam, Jon Heales, Nicole Hartley, Chris Hodkinson Identification of Enterprise Social Network (ESN) Group Archetypes in ESN Analytics 2020-05-17T17:42:27-07:00 Kai Riemer Laurence Lock Lee Cai Kjaer Annika Haeffner <p class="JnlBody">With the proliferation of Enterprise Social Networks (ESN), the measurement of ESN activity becomes increasingly relevant. The emerging field of ESN analytics aims to develop metrics and models to measure and classify user activity to support organisational goals and outcomes. In this paper we focus on a neglected area of ESN analytics, the classification of activity in ESN groups. We engage in explorative research to identify a set of metrics that divides an ESN group sample into distinct types. We collaborate with Sydney-based service provider SWOOP Analytics who provided access to actual ESN meta data describing activity in 350 groups across three organisations. By employing clustering techniques, we derive a set of four group types: broadcast streams, information forums, communities of practice and project teams. We collect and reflect on feedback from ESN champions in fourteen organisations. For ESN analytics research we contribute a set of metrics and group types. For practice we envision a method that enables group managers to compare aspirations for their groups to embody a certain group type, with actual activity patterns.</p> 2020-05-11T19:54:20-07:00 Copyright (c) 2020 Kai Riemer, Laurence Lock Lee, Cai Kjaer, Annika Haeffner Applying Complex Adaptive Systems Theory to Understand Distributed Participatory Design in Crowdsourced Information Systems Development 2020-05-11T20:02:14-07:00 Karlheinz Kautz Gro Bjerknes Julie Fisher Tomas Jensen <p class="JnlBody">Contemporary information systems development (ISD) takes place in a dynamic environment; it is generally acknowledged as a complex activity. It has been proposed that ISD projects should be viewed as a complex adaptive system (CAS) and that these projects are better understood through the application of CAS. Distributed participatory design (DPD) is an approach to contemporary ISD where different, geographically dispersed stakeholders, often called the crowd, participate voluntarily and typically unaffiliated with the development organisation in the development and design of information systems in distributed design teams which are mostly online on Internet, web-based, and social media platforms. Going beyond individual methods, techniques, and practices, the objective of this research is twofold as we answer the two research questions: how are DPD projects in crowdsourced ISD managed and performed in their entirety and how does CAS theory provide plausible explanations and contribute to an understanding of contemporary ISD? For this purpose, we present a case of DPD in crowdsourced ISD in an intergovernmental, not-for-profit environment in the context of a DPD project which engaged Pacific Youth in the development of a digital game where we applied CAS theory to better understand and gain insights for ISD theory and practice.</p> 2020-05-11T19:56:19-07:00 Copyright (c) 2020 Karlheinz Kautz, Gro Bjerknes, Julie Fisher, Tomas Jensen Collaborative Modelling and Visualization of Business Ecosystems 2020-05-11T20:02:13-07:00 Anne Faber Adrian Hernandez-Mendez Sven-Volker Rehm Florian Matthes <p class="JnlBody">Business ecosystems are increasingly gaining relevance in research and practice. Because ecosystems progressively change, enterprises are required to analyse their ecosystem, in order to identify and respond to such changes. For gaining a comprehensive picture of the ecosystem, various enterprise stakeholders need to be involved in the analysis process. We use an Action Design Research approach to implement a collaborative process for modelling and visualizing business ecosystems in two case studies. We look at the challenges of the collaborative process and study how a model-driven approach addresses these challenges. We validate and discuss the modelling process along six steps; definition of the business ecosystem focus, model instantiation, data collection, provision of tailored visualizations, model adaption, and using visualizations ‘to tell a story’. In a cross-case analysis, we draw conclusions with respect to process implementation and the role of visualizations.</p> 2020-05-11T19:58:46-07:00 Copyright (c) 2020 Anne Faber, Adrian Hernandez-Mendez, Sven-Volker Rehm, Florian Matthes Preface Ethics in the Cyber Age and exploring emerging themes and relationships between ethics, governance and emerging technologies 2020-06-08T21:02:33-07:00 Matt Warren Kirsten Wahlstrom Marcus Wigan Oliver Kisalay Burmeister <p>Preface to the special section of selected papers from the 8th Australasian Institute of Computer Ethics (AiCE) conference, held in Melbourne, 19-20th August, 2019.</p> 2020-06-08T20:49:34-07:00 Copyright (c) 2020 Matt Warren, Kirsten Wahlstrom, Marcus Wigan, Oliver Kisalay Burmeister Rethinking IT Professional Ethics 2020-06-08T21:02:32-07:00 Marc Wigan <p>Professional computer ethics has widened its scope over the last 20 years as a direct result of the massive growth in computer mediated services by government and industry, and concerns over how data and interaction processes are recorded. These shifts are explored in conjunction with the parallel decline in community trust of government. The growing importance of a broader view and action framework for professional computer societies is delineated.</p> 2020-06-08T20:50:31-07:00 Copyright (c) 2020 Marc Wigan Towards an Ontology and Ethics of Virtual Influencers 2020-06-08T21:02:31-07:00 Ben Robinson <p>In 2018, TIME magazine named Miquela Souza one of the 25 most influential people on the internet, despite the fact she is not a person at all. Miquela is the first digitally created virtual influencer. This paper provides an initial analysis of some of the ontological and ethical issues associated with the rise of virtual influencers on social media platforms like Instagram. Through a focus on Miquela, it is argued that while these fabricated identities may cause uneasiness at first, there is nothing morally significant that distinguishes them from natural, ‘real life’ influencers. But, far from ‘business as usual’, the inability to separate ‘virtual’ and ‘real life’ influencers raises important questions about the ethical construction of identity, and how this may affect the ongoing preservation of social values like trust in online spaces. The paper draws on literature in personal identity and agency theory to establish the ontological claim that there is no meaningful difference between Miquela and other ‘real life’ influencers, which leads to the discussion about ethical issues including moral responsibility and motivation, and transparency. As of May 2020, this appears to be the first peer-reviewed article theorising about virtual influencers. There are significant opportunities for further research, both in terms of how we should conceptualise these identities, as well as more empirically based social research into how to preserve social values like trust in online spaces.</p> 2020-06-08T20:51:22-07:00 Copyright (c) 2020 Ben Robinson Fake News Case Study during the Australian 2019 General Election 2020-06-08T21:02:30-07:00 Matthew Warren <p>Social media is used by all aspects of society from citizens to businesses, but it also now used by political parties. Political parties use social media to engage with voters as a method of attract new voters or reinforcing the views of political parties’ current supporters. An important consideration is the ethical conduct of political parties and politicians in how they use social media. It is now recognized that social media can also have negative aspects seen by the introduction of Fake News. These negative aspects of social media are often overlooked and have not been explored from a research perspective. This paper looks at the Australian 2019 General Election and discusses a major Fake News example that occurred during that election. The paper will also describe the different types of social media data was collected during the study and also present the analysis of the data collected as well discussing the research findings including the ethical issues.</p> 2020-06-08T20:52:20-07:00 Copyright (c) 2020 Matthew Warren Privacy by design 2020-06-08T21:02:29-07:00 Kirsten Wahlstrom Anwaar Ul-haq Oliver Burmeister <p>Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.</p> 2020-06-08T20:53:14-07:00 Copyright (c) 2020 Kirsten Wahlstrom, Anwaar Ul-haq, Oliver Burmeister The Three Harms of Gendered Technology 2020-06-08T21:02:28-07:00 Lena Wang <p>Marginalised groups experience both immediate and long-term detriment as a result of innovations in information systems. This paper explores three facets of technologically related gendered harm: physical, institutional, and psychological. These harms will be demonstrated by case studies. Firstly, technology can cause physical harm by denying women their bodily autonomy, demonstrated by the public availability of AI software that generates nude pictures of women, and smart home devices used in instances of domestic abuse. Secondly, technology can deny women institutional access, as increasingly widespread algorithms are shown to underperform on marginalised groups. Thirdly, anthropomorphised technology reflects and entrenches harmful stereotypes of women’s submissiveness, causing psychological harm. Reducing harm must go beyond ensuring a diversity of representation in STEM fields. We conclude that effective regulation should focus on the design features in technological innovations.</p> 2020-06-08T20:54:12-07:00 Copyright (c) 2020 Lena Wang The Shared Responsibility Model 2020-06-08T21:02:27-07:00 Michael Wildenauer <p>This exploratory paper provides social context for platform corporations and examples of ethical transgressions by them and then canvasses the role of various organizational actors in controlling the ethical behaviour of ‘platforms', which may be seen to be more than usually problematic in this regard. From this survey, the conclusion is drawn that there may be no single actor that offers sufficient leverage to change organizational ethical behaviour. The paper then suggests the Shared Responsibility Model as a possible conceptual framework for a better understanding of the issue of ethical control and recommends practical interventions that may assist in realizing ethical behaviour by platforms that more closely aligns with societal expectations. The paper offers a caution about the side-effects of interventions to improve ethical behaviour, before concluding by pointing out implications of these findings for state-actor regulators and avenues for future research.</p> 2020-06-08T20:55:10-07:00 Copyright (c) 2020 Michael Wildenauer Review: Responsible use of technology to combat Cyberbullying among adolescents 2020-06-08T21:02:26-07:00 Chintha Kaluarachchi Matthew Warren Frank Jiang <p>Cyberbullying has become a major challenge for authorities, parents, guardians and schools in particular, especially in the era of the digital world. This paper reviews available empirical research to examine the issues such as the responsible use of technology amongst young people, parents and schools responsibility to protect against Cyberbullying. The analysis revealed that the responsible use of technology provides better practices to encourage comparisons because of these new digital technologies. Parents and educators are the key to Cyber ethics, therefore teaching the responsible use of technology whilst focusing on Cyber ethics at the start of young people’s exposure to technology use may be an excellent strategy to reduce the growth and impact of Cyberbullying. The paper will also review good practices for young people, school communities and parents to prevent and manage Cyberbullying and unethical behaviours online. These claims are examined using current literature to ensure a better understanding of responsible use of technology and understanding of Cyberbullying in order to support young people to combat this immerging societal challenge.</p> 2020-06-08T20:56:38-07:00 Copyright (c) 2020 Chintha Kaluarachchi, Matthew Warren , Frank Jiang Towards Using Value Tensions to Reframe the Value of Data Beyond Market-based Online Social Norms 2020-06-08T21:02:25-07:00 Anisha Fernando Lesa Scholl <p>Making sense of data, its value and impact is imperative for individuals, organisations and societies to function in the cyber age. The online interactions through which data flows present many benefits. However, the consumption of data and its value is problematic due to an overreliance on market norms as a substitute for values-based online social norms and practices, creating value tensions. Understanding the implications of data is further complicated due to the complex contextual nature of online interactions. These challenges are addressed through efforts from technology organisations and policy initiatives. Largely absent from these efforts is an understanding of the values needed to ground healthy online social interactions, and processes that nurture and afford the practice of these values in contextual community settings. Value tensions as an ethics tool can surface and clarify these interpersonal needs in understanding data and its impact. Communities may be appropriately placed to grapple with these value tensions given the contextual nature of interactions. This discussion paper presents a preliminary research agenda raising questions on uncovering value tensions and understanding the values at stake to transform data practices and develop healthy online social norms, to reframe the value of data beyond market-based online social norms.</p> 2020-06-08T20:57:58-07:00 Copyright (c) 2020 Anisha Fernando, Lesa Scholl Cybersecurity, value sensing robots for LGBTIQ+ elderly, and the need for revised codes of conduct 2020-06-08T21:02:24-07:00 Adam Poulsen Eduard Fosch-Villaronga Oliver K Burmeister <p>Until now, each profession has developed their professional codes of conduct independently. However, the use of robots and artificial intelligence is blurring professional delineations: aged care nurses work with lifting robots, tablet computers, and intelligent diagnostic systems, and health information system designers work with clinical teams. While robots assist the medical staff in extending the professional service they provide, it is not clear how professions adhere and adapt to the new reality. In this article, we reflect on how the insertion of robots may shape codes of conduct, in particular with regards to cybersecurity. We do so by focusing on the use of social robots for helping LGBTIQ+ elderly cope with loneliness and depression. Using robots in such a delicate domain of application changes how care is delivered, as now alongside the caregiver, there is a cyber-physical health information system that can learn from experience and act autonomously. Our contribution stresses the importance of including cybersecurity considerations in codes of conduct for both robot developers and caregivers as it is the human and not the machine which is responsible for ensuring the system’s security and the user’s safety.</p> 2020-06-08T20:59:04-07:00 Copyright (c) 2020 Adam Poulsen, Eduard Fosch-Villaronga, Oliver K Burmeister Preface to the Special Section on the 10th Information Systems Foundations Workshop 2020-03-16T20:55:01-07:00 Sigi Goode <p>Introduction to the Special Section.</p> 2020-03-16T20:44:59-07:00 Copyright (c) 2020 Sigi Goode Explanations as Discourse 2020-03-16T20:55:00-07:00 Sadaf Afrashteh Ida Someh Michael Davern <p class="JnlBody">Big data analytics uses algorithms for decision-making and targeting of customers. These algorithms process large-scale data sets and create efficiencies in the decision-making process for organizations but are often incomprehensible to customers and inherently opaque in nature. Recent European Union regulations require that organizations communicate meaningful information to customers on the use of algorithms and the reasons behind decisions made about them. In this paper, we explore the use of explanations in big data analytics services. We rely on discourse ethics to argue that explanations can facilitate a balanced communication between organizations and customers, leading to transparency and trust for customers as well as customer engagement and reduced reputation risks for organizations. We conclude the paper by proposing future empirical research directions.</p> 2020-03-16T20:46:53-07:00 Copyright (c) 2020 Sadaf Afrashteh, Ida Someh, Michael Davern The Challenges Involved in Establishing a Research Technique 2020-03-16T20:54:59-07:00 Roger Clarke <p>Many research techniques are well-accepted within the Information Systems (IS) discipline.&nbsp; From time to time, however, a researcher investigates a question that requires a novel approach.&nbsp; It is then incumbent on the researcher to justify that approach. The IS discipline has accumulated a large corpus of published works.&nbsp; A project is being undertaken whose purpose is to establish the conceptual foundations for a research technique for the critical analysis of published works, and to develop methodological guidance for its application. This article discusses the challenges that have confronted that undertaking.</p> 2020-03-16T20:49:15-07:00 Copyright (c) 2020 Roger Clarke Making IS Relevant in a Connected World 2020-03-16T20:54:58-07:00 Henry Linger Helen Hasan <p class="JnlBody">The exponential growth of the Internet since the mid-1990s has greatly expanded the capacity of people everywhere to interconnect and engage through digital technologies. As a complex adaptive system of systems, the Internet has extended the range and complexity of phenomena of interest to Information Systems (IS) scholars. This is both an exciting opportunity and a challenge which we explore in this paper by revisiting the Intellectual Structures Framework (Hirshheim et al. 1996) which attempted to make sense of the fragmented adhocracy of IS, before the expansion and penetration of the Internet. We suggest that the IS adhocracy, with its multi-disciplinary and systems-oriented nature, gives IS researchers the requisite variety to contend with the increasingly diverse digital ecologies of IS-enabled human activities that have emerged in the ensuing two decades. Based on relevant research over these two decades we present a revised framework that (1) reflects the complexities of contemporary IS phenomena and (2) can act as an instrument for analysing such phenomena across a spectrum of human activities. We justify the form and content of the Revised Intellectual Structures Framework, providing examples of its application in IS research using appropriate research methods and techniques. We argue that our revisions to the original framework provides individuals, organisations, and societies with a conceptual lens that is necessary to better address the challenges and opportunities posed by the complexities of contemporary digital ecologies.</p> 2020-03-16T20:51:32-07:00 Copyright (c) 2020 Henry Linger, Helen Hasan Incidental findings on multimodel comparison, hypothesis testing error, and its solution 2020-04-27T18:57:49-07:00 Weng Marc Lim Symeon Mandrinos <p class="JnlBody">This article sheds light on an incidental discovery of hypothesis testing error and its solution in a study that compared the multimodel effects of information and knowledge on career decisions. Using a sample of 500 second and third year undergraduates who were simple randomly recruited from 10 simple randomly selected universities, the study demonstrates how hypothesis testing error could occur when multimodel comparison of the effects of the same set of independent constructs (information and knowledge) on a different but related set of dependent constructs (career pursuit and rewarding career pursuit) is performed and how that error can be avoided through detailed scrutiny of the psychic distance between the dependent constructs. It is hoped that the insights herein will be useful for scholars to avoid and overcome the pitfall of hypothesis testing error arising from multimodel comparison involving a different but related set of dependent constructs.</p> 2020-04-27T18:56:13-07:00 Copyright (c) 2020 Weng Marc Lim, Symeon Mandrinos Towards developing a Healthcare Situation Monitoring Method for Smart City Initiatives 2020-06-29T20:19:08-07:00 Shah J Miah H. Quan Vu <p>Research in Smart City development has been proliferated over the past few years, which focused heavily on various supporting service sectors, such as healthcare. However, little effort has been made to design health surveillance support systems, which is also important for the advancement of public healthcare monitoring as an essential smart city initiatives. From an information system (IS) design perspective, this paper introduces a social media-based health surveillance supporting method, which can automatically extricates relevant online posts for health symptom management and prediction. We describe and demonstrate an IS design approach in this paper for hay-fever prediction solution concept based on Twitter posts. This concept can be applicable to fully functional solution design by relevant practitioners in this field.</p> 2020-06-29T20:16:12-07:00 Copyright (c) 2020 Shah J Miah, H. Quan Vu A Post Publication Review of 'The impact of telehealth technology on user perception of wellbeing and social functioning, and the implications for service providers' 2020-05-04T21:46:44-07:00 Adam Poulsen <p>This post publication review discusses the article by Burmeister et al. (2019) in which the authors present a study evaluating the social, economic, and wellbeing impacts of telehealth technology in the homes of community-dwelling older persons, highlighting its contribution and identifying areas for further research. The article centres on one particular project in which telehealth monitoring systems were used in homes in regional New South Wales.</p> 2020-05-04T21:45:28-07:00 Copyright (c) 2020 Adam Poulsen A Post Publication Review of 'Understanding the effects of compromise and misuse of personal details on older people' 2020-06-01T20:12:45-07:00 Oliver Kisalay Burmeister <p>This post publication review discusses the article by Watson, Lacey, Kerr, Salmon, and Goode (2019). That article raises important considerations for older people when they interact online. It is a thorough review of the non-financial considerations related to cyber safety for older people in Australia. The authors raise a few issues to consider for future research, but of course like everyone else in the world, they could not foresee the COVID-19 pandemic.</p> 2020-06-01T20:08:56-07:00 Copyright (c) 2020 Oliver Kisalay Burmeister A post-publication review of "Research directions in information systems field, current status and future trends: A literature analysis of AIS basket of top journals" 2020-08-17T19:15:58-07:00 Weng Marc Lim <p>This post-publication review highlights the strengths and shortcomings of Mazaheri, Lagzian, and Hemmat (2020) and the key considerations for future systematic reviews in information systems.</p> 2020-08-17T19:14:38-07:00 Copyright (c) 2020 Weng Marc Lim A Post Publication review of "The challenges involved in establishing a research technique" 2020-11-23T18:20:53-08:00 Weng Marc Lim Tareq Rasul Roger Clarke <p>This post-publication review offers a meta-discussion of critical reviews based on the seminal work of Clarke (2020).</p> 2020-11-23T18:19:39-08:00 Copyright (c) 2020 Weng Marc Lim, Tareq Rasul, Roger Clarke