Australasian Journal of Information Systems https://journal.acs.org.au/index.php/ajis <p>The <cite>Australasian Journal of Information Systems</cite> (AJIS) is an international quality, peer reviewed journal covering innovative research and practice in Information Systems.</p> en-US <p>AJIS publishes open-access articles distributed under the terms of a Creative Commons Non-Commercial and Attribution License&nbsp;which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and AJIS are credited. All other rights including granting permissions beyond those in the above license remain the property of the author(s).</p> AJIS.EiC@gmail.com (Professor Karlheinz Kautz) AJIS.EiC@gmail.com (Professor Karlheinz Kautz) Thu, 18 Feb 2021 18:03:03 -0800 OJS 3.1.2.1 http://blogs.law.harvard.edu/tech/rss 60 An Exploratory Study of the Effects of Knowledge Sharing Methods on Cyber Security Practice https://journal.acs.org.au/index.php/ajis/article/view/2177 <p>In a networked global economy, cyber security threats have accelerated at an enormous rate. The security infrastructure at organisational and national levels are often ineffective against these threats. As a result, academics have focused their research on information security risks and technical perspectives to enhance human-related security measures. To further extend this trend of research, this study examines the effects of three knowledge sharing methods on user security practices: security training, social media communication, and local security experts (non-IT staff). The study adopts a phenomenological method employing in-depth focus group interviews with 30 participants from eight organisations located in Ho Chi Minh city, Vietnam. The study expands on understanding factors contributing to self-efficacy and security practice through various knowledge sharing channels. Current methods of periodical training and broadcast emails were found to be less effective in encouraging participants to develop security self-efficacy and were often ignored. Security knowledge sharing through social media and local experts were identified as supplementary methods in maintaining employees’ security awareness. In particular, social media is suggested as a preferred channel for disseminating urgent security alerts and seeking peer advice. Local security experts are praised for providing timely and contextualised security advice where member trust is needed. This study suggests that provisions of contemporary channels for security information and knowledge sharing between organisations and employees can gain regular attention from employees, hence leading to more effective security practices.</p> Hiep Cong Pham, Irfan Ulhaq, Minh Nguyen, Mathews Nkhoma Copyright (c) 2021 Hiep Cong Pham, Irfan Ulhaq, Minh Nguyen, Mathews Nkhoma https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/2177 Thu, 18 Feb 2021 17:59:51 -0800 Exploring the Digital Business Ecosystem of Internet of Things in Emerging Economies with a focus on the role of pseudo-private companies https://journal.acs.org.au/index.php/ajis/article/view/2719 <p class="JnlBody">The Internet of Things (IoT) is one of the emerging drivers of the economy that transforms the business landscape and forms of collaboration and value creation. In this study, we performed a Delphi-based study to explore the digital business ecosystem (DBE) of IoT in emerging economies, focusing on power dynamics among actors, the processes of value co-creation, topologies, and critical success factors affecting the health of the ecosystem. We conducted two panels of a three-round Delphi study from 2017 through 2019 among Iranian IoT experts. This study identifies two types of the digital business ecosystems surrounding IoT in Iran. One type comprises only pseudo-private companies that have strong interactions with government organizations and state-owned banks. The other type of digital business ecosystem surrounding IoT technology comprises start-ups and private small and medium companies that have no interaction with pseudo-private companies. The interaction of start-ups and Small Medium Enterprises (SMEs) is mainly with universities. The study shows that pseudo-private companies play a dominant role in the Business to Business (B2B) and Business to Government (B2G) markets while SMEs and start-ups have a dominant role in the B2C market and promote creativity and innovation in the Business to Customer (B2C) market. This study extends the literature on&nbsp; digital business ecosystems with a focus on the health of the DBEs of IoT technologies and the potential for future innovation in the digital economy.</p> Tahereh Saheb, Faranak Hosseinpouli Mamaghani Copyright (c) 2021 Tahereh Saheb, Faranak Hosseinpouli Mamaghani https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/2719 Tue, 06 Apr 2021 17:27:03 -0700 Special Section of Invited Papers from the 30th Australasian Conference on Information Systems https://journal.acs.org.au/index.php/ajis/article/view/3449 <p>This article introduces the papers which were invited for this special section.</p> Deborah Bunker, Annette Mills, Doug Vogel Copyright (c) 2021 Deborah Bunker, Annette Mills, Doug Vogel https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/3449 Tue, 06 Apr 2021 18:29:23 -0700 The Coevolution of Routines and IT Systems in IT-enabled Organizational Transformation as an Instance of Digital Transformation: https://journal.acs.org.au/index.php/ajis/article/view/2855 <p class="JnlBody">This paper proposes a conceptual framework to study the phenomenon of IT-enabled Organizational Transformation (IT-enabled OT) as a coevolution process of organizational routines and a new IT system. The framework’s objective is to understand IT-enabled OT in a holistic and integrated manner by investigating how actors perceive, interpret, appropriate, and enact, the new IT system in their work routines as well as how they align the new system and these routines with the social order and structures of the organization. It allows the examination of the reciprocal interactions between different aspects of organizational routines and a new IT system to enhance the understanding of how change unfolds in an organization during the implementation, the adoption, use, and adaptation of a new IT system. We illustrate the scope, the analytic and conceptual strength of the framework with a number of examples from the literature and, lastly, discuss its ontological positioning. The paper concludes with a call for further research to empirically validate and refine the proposed framework.</p> Faqir Taj, Karlheinz Kautz, Vince Bruno Copyright (c) 2021 Faqir Taj, Karlheinz Kautz, Vince Bruno https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/2855 Tue, 06 Apr 2021 18:36:30 -0700 Compliance with security guidelines in teenagers https://journal.acs.org.au/index.php/ajis/article/view/2953 <p class="JnlBody">What drives teenagers to comply with computer password guidelines? Using an extended form of protection motivation theory (PMT) (Rogers, 1983), we found that even if teenage computer users believe they are susceptible to being hacked, or that being hacked would be detrimental, it has no bearing on their password choices. Other motives outside of PMT also drive teenage security behaviour. Personal norms fully mediate the relationship between the perceived severity of threat and compliance intentions such that perceived severity is not sufficient to encourage compliance. Teenagers must actually feel obligated to comply. While personal norms may encourage compliance, concerns about feeling embarrassed or ashamed if their social media accounts are hacked into actually encourages compliance. On the other hand, peer influence, such as the fear of being teased about someone hacking into their account, discourages compliance. Our study contributes to understanding early security practices and highlights potential differences between adult and teenage behaviours to consider in future studies. For example, our findings suggest that password security guidelines alone will not suffice to ensure teenage compliance; they may need enforced password rules at the authentication level to eliminate any opportunity to violate password rules. Our study will benefit children and parents as well as organizations that have changed work practices to enable employees to work from home, but which places children in danger of clicking on malicious links on their parents’ computers. To our knowledge, this is the first password security study that applies PMT to examine computer-based security behaviours in teenagers.</p> Florence Mwagwabi, Jhee Hee Jiow Copyright (c) 2021 Florence Mwagwabi, Jhee Hee Jiow https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/2953 Tue, 06 Apr 2021 18:47:23 -0700 Decision Support Systems in the Context of Cyber-Physical Systems https://journal.acs.org.au/index.php/ajis/article/view/2849 <p>Cyber-physical systems promise a complete networking of all actors and resources involved in production and thus an improved availability of information. In this context decision support systems enable appropriate processing and presentation of the captured data. In particular, production scheduling could benefit from this, since it is responsible for the short-term planning and control of released orders. Since decision support systems and cyber-physical systems together are not yet widely used in production scheduling, the aim of this research study is to analyse the adoption of these technologies. In order to do so, we conducted a qualitative interview study with experts on production scheduling. Thereby, we identified eleven influencing factors and 22 related challenges, which affect the adoption of decision support systems in production scheduling in the context of cyber-physical systems. We further discuss and assess the identified influencing factors based on the interview study. The results help to explain and improve the adoption of those systems and can serve as a starting point for their development.</p> Pascal Freier, Matthias Schumann Copyright (c) 2021 Pascal Freier, Matthias Schumann https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/2849 Tue, 06 Apr 2021 19:07:19 -0700 A Conceptual Tool to Eliminate Filter Bubbles in Social Networks https://journal.acs.org.au/index.php/ajis/article/view/2867 <p>Reliance on social media as a source of information has lead to several challenges, including the limitation of sources to viewers’ preferences and desires, also known as filter bubbles. The formation of filter bubbles is a known risk to democracy. It can bring negative consequences like polarisation of the society, users’ tendency to extremist viewpoints and the proliferation of fake news. Previous studies have focused on specific aspects and paid less attention to a holistic approach for eliminating the notion. The current study, however, aims to propose a model for an integrated tool that assists users in avoiding filter bubbles in social networks. To this end, a systematic literature review has been undertaken, and initially, 571 papers in six top-ranked scientific databases have been identified. After excluding irrelevant studies and performing an in-depth analysis of the remaining papers, a classification of research studies is proposed. This classification is then used to introduce an overall architecture for an integrated tool that synthesises all previous studies and offers new features for avoiding filter bubbles. The study explains the components and features of the proposed architecture and concludes with a list of implications for the recommended tool.</p> Alireza Amrollahi Copyright (c) 2021 Alireza Amrollahi https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/2867 Tue, 06 Apr 2021 19:14:08 -0700 Intelligent agent based framework to augment warehouse management systems for dynamic demand environments https://journal.acs.org.au/index.php/ajis/article/view/2845 <p>Warehouses are being impacted by increasing e-commerce and omni-channel commerce. The design of current WMSs (Warehouse Management Systems) may not be suitable to this mode of operation. The golden rule of material handling is smooth product flow, but there are day-to-day operational issues that occur in the warehouse that can impact this and order fulfilment, resulting in disruptions. Standard operational process is paramount to warehouse operational control but may preclude a dynamic response to real-time operational constraints. The growth of IoT (Internet of Things) sensor and data analytics technology provide new opportunities for designing warehouse management systems that detect and reorganise around real-time constraints to mitigate the impact of day-to-day warehouse operational issues. This paper presents the design and development stage of a design science methodology of an intelligent agent framework for basic warehouse management systems. This framework is distributed, is structured around operational constraints and includes the human operator at operational and decision support levels. An agent based simulation was built to demonstrate the viability of the framework.</p> Tania Binos, Vince Bruno, Arthur Adamopoulos Copyright (c) 2021 Tania Binos, Vince Bruno, Arthur Adamopoulos https://creativecommons.org/licenses/by-nc/3.0/au/ https://journal.acs.org.au/index.php/ajis/article/view/2845 Tue, 06 Apr 2021 19:21:18 -0700