Browsing Proceedings of the 25th Australasian Conference on Information Systems, 8th - 10th December, Auckland, New Zealand by Issue Date
Now showing 1 - 20 of 179
Results Per Page
- ItemIndustry Challenges and Policy Barriers in Adoption of Mobile Value Added Services in Remote Islands: The Case of Fiji(ACIS, 2014) Sathye, Milind; Prasad, Biman; Sharma, Dharmendra; Sharma, Parmendra; Sathye, SuneetaWhile mobile phones are making significant inroads in many developing countries, little remains known about the policy and infrastructure constraints that affect their use for growth of micro enterprises. We address this gap in the literature. The uniqueness of our study also lies in the focus on women micro entrepreneurs in a remote Pacific island country. To obtain both the demand-side and supply-side perspectives, we conducted semi-structured interviews of 74 women micro entrepreneurs and ten key informants from the Fijian Government, mobile network operators (MNOs), and financial institutions. We found that appropriate policy framework, supporting infrastructure and appropriate ecosystem are required for rapid uptake of mobile value added services by women owned micro enterprises in Fiji. A significant number of women micro entrepreneurs were willing to embrace mobile value added services if these were made available with adequate security and at reasonable cost.
- ItemIntegrated Modelling of Business Process Models and Business Rules: A Research Agenda(ACIS, 2014) Wang, Wei; Indulska, Marta; Sadiq, ShaziaProcess models are the basis for a wide range of critical activities within an organisation. It is not surprising then that process models, and the act of process modelling, have been the focus of much research over the last two decades. Recent research indicates, however, that common process modelling notations lack sufficient representation for capturing business rules. Although the need for business processes and business rules to be modelled in an integrated manner is well established, the body of knowledge on integrated modelling of the two is limited. In this paper our aim is to review the state of related research and develop a research agenda, based on a systematic review of related literature, to advance research in this field. We present a consolidated view of the benefits of rule and process model integration, together with an overview of current related approaches, and a research agenda going forward.
- ItemCan Twitter Enhance Food Resilience?: Exploring Community Use of Twitter using Communicative Ecology(ACIS, 2014) Ardianto, Danny; Aarons, Jeremy; Burstein, FradaFood resilience - providing affordable access to a nutritionally balanced food supply - is a major sustainability challenge for growing urban populations worldwide, particularly in the developing world. This paper reports the use of Twitter for building urban food resilience through a case study of an urban agriculture community in Indonesia. A rule-guided qualitative content analysis is used to interpret meaning from digital text data and to bring methodological strength of quantitative analysis. In this study, communicative ecology theory is used to frame our understanding of the emerging themes in terms of topic of tweets, intention of tweets, and parties involved in the communication. We found that support for participation in urban agriculture is the most dominant content of communication and extending reach is the common intention of tweets while internal community networks are the most visible parties involved.
- ItemThe practitioner view of the top 10 key issues in Business Intelligence – 2014(ACIS, 2014) O'Donnell, Peter; Sipsma, Sophie; Watt, CarolynThis paper presents the top 10 key issues currently faced by Business Intelligence practitioners in Australia. The issues presented were obtained from a series of nominal group technique based meetings held in major Australian cities in late 2013. The meetings involving BI practitioners were designed to elicit their most important BI challenges. “User engagement” is currently the major issue being faced by practitioners. Interestingly, while the topic of “analytics” features in the list, it is not a major concern for practitioners in the field. The list of issues provides an insight into the work performed by BI practitioners that can be used to define a research agenda that is relevant to their needs.
- ItemIntention of Sharing Travel Experiences on Social Media: Motivations and the Moderating Effect of Face Orientation(ACIS, 2014) Wang, Xiaorong; Li, Xinyu; Li, Qi; Peng, LifangAs the application of social media in tourism growing rapidly, shared information on social media is recognized as an important information source for both tourism suppliers and potential tourists. This study constructs a conceptual framework why tourists share their travel experiences on social media based on the theory of reasoned action and the self-determination theory, and tests four conceptual foundations in the framework: intrinsic motivation, extrinsic motivation and face orientation which contains protective face and acquisitive face. Data were collected through an online survey and the research model was tested with 353 respondents who were social media users. The results indicate that protective face was observed to negatively moderate the relationship between both intrinsic as well as extrinsic motivations and sharing intention respectively, while the moderating effect of acquisitive face is significant on neither. Our findings extend prior literature, and offer a theoretic guidance to tourism industry on how to improve business through social media.
- ItemA Generalized Threat Taxonomy for Cloud Computing(ACIS, 2014) Ahmed, Monjur; Litchfield, Alan T; Ahmed, ShakilThis paper presents a genre-based, generalized threat taxonomy for cloud computing. Cloud computing provides numerous possibilities and challenges but the nature of cloud computing exposes the resources of a cloud architecture to a wide range of threats. Presently, many potential threats, represented as security concerns, are known in a general sense but they are not classified specifically in relation to cloud services delivery. Therefore security concerns need identification and assessment and presented in a consistent and hierarchical form. We posit that to approach the issue in this way allows for more effective enforcement and therefore better resilience in a cloud architecture. We further posit that failure to effectively identify threats will lead to lower levels of trust, effectiveness and performance. The generalized threat taxonomy provides researchers with a framework through which risk factors and threats may be identified; and related against an overall picture of threat patterns.
- ItemThe Research on Characteristics of E-Commerce Enterprises’ Knowledge Workers and Their Motivating Factors(ACIS, 2014) Zhan, Hong; Peng, Lifang; Ma, Yuanyuan; Lin, JianhuangWith the development of the Internet,e-commerce enterprises spring up like the mushrooms.To a large extent, it depends on the knowledge workers who possess the three knowledge management systems——IT technology, network management technology and industry.The current study surveyed major studies on the characteristics of and motivating factors for e-commerce enterprises’ knowledge workers, both in the USA and in China. Comparisons were made between studies in the two countries, and new perspectives were offered on the motivating factors for knowledge workers. Future research directions were proposed.
- ItemConceptualisation of Digital Traces for the Identification of Informal Networks in Enterprise Social Networks(ACIS, 2014) Behrendt, Sebastian; Richter, Alexander; Riemer, KaiOrganisations can be understood as organisms exhibiting a formal structure formalised by the “org chart”, and informal structures of emerging networks between employees. The increasing use of Enterprise Social Networks (ESN) provides mangers and researchers with new opportunities to uncover formal and informal structures. Yet, it remains underexplored what exactly constitutes relationship structures in ESN. We employ the notion of ‘digital traces’, stored as user-generated data on the ESN and set out to explore ways for conceptualising relations as the basis for network constitution and visualisation. We illustrate our approach with a case study of an ESN and demonstrate how resulting networks vary significantly depending on the digital traces employed.
- ItemHealthy Community and Healthy Commons: ‘Opensourcing’ as a Sustainable Model of Software Production(ACIS, 2014) Naparat, Damrongsak; Cahalane, Michael; Finnegan, PatrickMany commercial software firms rely on opensourcing as a viable model of software production. Opensourcing is a specific form of interaction between firms and open source software (OSS) communities for collaboratively producing software. The existing literature has identified opensourcing as a viable form of software production, which could be a substitute for “in-house” or “outsourced” software development. However, little is known about how opensourcing works or is sustained in the long term. The objective of this research is to explain the factors affecting the sustainability of opensourcing as a model of software production. The study employs a single case study of hospital software in Thailand to understand how firms and the communities can live symbiotically and sustain their collaboration to peer-produce vertical domain software. The analysis reveals six mechanisms (positive experience, trust in the leadership of the project leader, the demonstration of reciprocity, marketing the community, enriching knowledge, and face-to-face meetings) and demonstrates how they operate in conjunction with each other to sustain opensourcing.
- ItemLong Distance Calling? Spatial Preference Patterns in Enterprise Microblogging in the Retail Industry(ACIS, 2014) Lekse, Dominik; Recker, JanWe examine enterprise social network usage data obtained from a community of store managers in a leading Australian retail organization, over a period of fifteen months. Our interest in examining this data is in spatial preferences by the network users, that is, to ascertain who is communicating with whom and where. We offer several contrasting theoretical perspectives for spatial preference patterns and examine these against data collected from over 12,000 messages exchanged between 530 managers in 897 stores. Our findings show that interactions can generally be characterized by individual preferences for local communication but also that two different user communities exist – locals and globals. We develop empirical profiles for these social network user communities and outline implications for theories on spatial influences on communication behaviours on enterprise social networks.
- ItemTowards An Agriculture Information Ecosystem(ACIS, 2014) De Silva, Lasanthi; Goonetillake, Jeevani; Wikramanayake, Gihan; Ginige, AthulaStakeholders of a domain in their day today activities generate information which is a valuable resource. To obtain full value of this information it should reach right people at the right time. To investigate how this can be achieved we developed an information flow model for agriculture domain by mapping information needed by stakeholders to information generated by others using set of aggregation and disaggregation operators. We found majority of information needs of stakeholders can be fulfilled by applying these operators to information produced by some other stakeholders thus creating a direct benefit to encourage sharing information. This information flow model had many similarities to biological ecosystems where nutrient cycles and energy flows are replaced by information flows. Based on this information ecosystem model we are developing a mobile based information system for farmers in Sri Lanka. Like biological ecosystems information ecosystems will also need time to grow and become sustainable.
- ItemThe impact of dynamic locking on collaborative programming(ACIS, 2014) Shatte, Adrian; Holdsworth, Jason; Lee, IckjaiThe parallel strategy of collaborative writing is commonly used by academia and industry. However, the nature of this approach may not scale to other genres of collaboration including collaborative programming. In this paper, we present a web-based prototype that supports parallel programming with the use of dynamic locking, and evaluate its scalability and system usability. Our results suggest there are benefits to our approach, and we discuss the implications and future directions for research.
- ItemIT alignment in SMEs: should it be with strategy or process?(ACIS, 2014) Cataldo, Alejandro; McQueen, RobertFor many years researchers have been concerned about the alignment of Information Technology (IT) in businesses. Most of the published research has been focused on understanding the alignment of IT with strategy, but a more recent view is that IT alignment with processes would be better, especially for SMEs. This research presents the two different approaches to measuring IT alignment, then uses the case of a small dental clinic to contribute to understanding these two alternative approaches. The results showed that both strategic alignment and process alignment were important, but strategic guidelines set the framework for the use of IT in the processes. These results contradict the claims of researchers who defend the process approach. This work has implications for practitioners because it again highlights the importance of IT in a strategic context in SMEs. This research also contributes to the theory of IT alignment in SMEs, and we hope this will encourage other researchers to study which approach is best suited for this type of business.
- ItemTowards Conceptualizing Information Transparency and its Role in Internet Consumers' Concerns: A Literature Review(ACIS, 2014) Cheah, Sin Mei; Dewan, SaifIn recent years, calls for a safer online shopping environment are growing louder. Empirical studies on consumers’ expectations of ethical e-commerce practices have found that the top concerns among e-shoppers revolved around security of transactions, privacy protection of personal data, deception and reliability issues. Consumer generally desire richer and truthful information to make purchase decisions. By addressing the information needs of consumers, transparency presents itself as a promising concept for firms to leverage towards strategizing its role in ethical practices. This paper revisits the consumer-perceived ethical issues in e-commerce literature, presents the disclosure paradox faced by e-seller firms, reviews the various conceptualizations of transparency in multidisciplinary literature and suggests extending the transparency strategy to map to consumers’ informational needs and concerns.
- ItemInterdependencies and IS programme coordination and control(ACIS, 2014) Khan, Muhammad Rasheed; Fernández, Walter D; Jiang, James JProgramme management has been historically employed as preferred means for design, development and implementation of large, complex Information Systems (IS). An oft cited rationale of programme management is coordination across multiple projects and related operational activities. Coordination is an information exchange activity that allows stakeholders to gain control over interdependent programme activities. While coordination and control have been examined separately in IS project management context, there is a need to understand the process of their interplay. An important concept that links coordination and control is dependencies among programme actors, tasks and resources. We suggest a field study based exploration of dependencies in IS programmes that is expected to explain the process of coordination and control in IS programme and in doing so we can extend the coordination theory.
- ItemHealthcare Social Question Answering: Concept Mapping and Cluster Analysis based on Graph Theory(ACIS, 2014) Blooma, Mohan John; Huy, Tran Duc; Wickramasinghe, NilminiHealthcare Social Question Answering (SQA) services are dedicated platforms for users to freely ask questions regarding their health related concerns and respond to or rate other users’ questions. To have a deeper insight into harnessing the rich data collected in healthcare SQA services, this study aims to investigate the concepts discussed using the intricate web of social relationships among questions, answers, associated askers and answerers by applying graph theory, concept mapping and cluster analysis. We collected 4212 question from Drugs.com, one of the popular healthcare SQA services to visualise concepts using Leximancer and cluster similar questions using quadripartite graph-based cluster analysis. The findings demonstrate the openness demonstrated by users on their weight, sleep and drug related questions. The cluster analysis revealed the possibility of applying graph theory to identify similar questions.
- ItemCollaborative IT Outsourcing in the Public Sector: A Case Analysis of Standard Business Reporting in Australia(ACIS, 2014) Sun, Ruonan; Gregor, Shirley; Keating, ByronThis study provides a case analysis of a successful collaborative information technology outsourcing arrangement in a public sector setting. An endogenous framework depicting four key factors (motivation, decision-making, outcomes, and relationship management) was developed and used to examine a collaboration between the Australian Government (Treasury and Taxation Office) and Fujitsu to develop Australia’s Standard Business Reporting infrastructure. Document analysis and interviews with business and technical executives of both parties provided insights that highlight a shift from cost-focused outsourcing initiatives toward more mutually beneficial partnerships focused on co-created value.
- ItemUtilising Capability Approach for Adoption of Assistive Technologies among Seniors: Conceptual Model(ACIS, 2014) Vichitvanichphong, Suchada; Talaei-Khoei, Amir; Kerr, Donald; Ghapanchi, Amir HosseinIn this paper we argue that the existing adoption theories lack a sufficient level of attention to the context of the everyday lives of seniors and as such have been incapable of successful explaining adoption concepts specifically related to seniors. The study highlights the concept of empowerment and relates it to assistive technologies that may assist in training and improving the functional abilities of the elderly with respect to their capabilities to undertake daily activities e.g. driving. The paper looks at empowering capabilities and utilises the capability approach to explain the constructs involved in the adoption technologies among seniors. In order to clarify the proposed constructs and the utilisation of the capability approach, the article presents an exemplar in adopting Xbox Kinect video games that combine physical, visual and cognitive abilities and can be used to help seniors to improve their driving. The paper is research in progress and invites experts to collect in-depth empirical evidence for the proposed model.
- ItemUnderstanding Resource Sharing in C2C Platforms: The Role of Picture Humanization(ACIS, 2014) Teubner, Timm; Adam, Marc T P; Camacho, Sonia; Hassanein, KhaledSharing spare resources on C2C web platforms yields economic advantages for users on both supply and demand sides. It also increases resource efficiency by enabling better utilization patterns, which in turn provides societal and environmental benefits. Establishing trust among users is a key factor in facilitating the sharing of resources in such platforms. Among other methods, the use of profile pictures has proven to increase trust in peer-to-peer interactions. However, this comes at a considerable cost of privacy. In this study, we compare different levels of user representations (i.e. picture humanization) in a lab experiment involving 216 users and analyze their effect on users’ sharing behaviour on a C2C platform. Our results indicate that an increased level of picture humanization increases users’ perception of social presence and decreases their perception of anonymity. In turn, perceived anonymity has a marginal negative impact on users’ sharing behaviour while perceived social presence impacts positively users’ sharing behaviour through a path that involves trust and perceived reciprocity.
- ItemMeasurement of Determinants for Enhancing Strategic Information Systems Planning (SISP) Success and Dynamic Capabilities in South Korea(ACIS, 2014) Yang, Jungho; Pita, Zijad; Singh, MohiniIn the current dynamic and increasingly globalized environments, Strategic Information Systems Planning (SISP) has been regarded as one of the most important tasks for better management and supporting strategic use of IS/IT. To facilitate organisational performance and sustain competitive advantage, it is necessary for organisations to recognize the importance of considering various determinants to achieve SISP success, and understand how SISP success affects improving dynamic capabilities as the outcome of its success. This paper proposes a model to show the relationship among six determinants, SISP success and its outcomes. We collected a sample of 250 from large organisations in Korea through the survey and used structural equation modelling to validate the proposed model. The result suggests that the determinants positively affect SISP success and the SISP success influences improving the outcome of SISP success. Besides, there is a positive relationship among the determinants, SISP success and the outcome of its success. Key findings and implications are discussed.