Browsing Conferences by Title
Now showing items 15-34 of 209
-
Beyond the Game: Issues with Social Media and Sporting Events
(ACIS, 2014)Society today is being transformed through the use of Social Media. While the resulting changes are typically marketed as having positive benefits on society, there is a negative side to Social Networking platform usage. ... -
Boundary Objects and Change in Agile Projects
(ACIS, 2014)Agile software development projects utilise different boundary objects in volatile and dynamic project environment. This environment subjects the boundary objects to constant change. The behaviour of boundary objects has ... -
Bring-Your-Own-Device (BYOD) practices in SMEs in Developing Countries – The Case of Tanzania
(ACIS, 2014)BYOD is a practice that is manifest in most organizations; however few studies have looked at this phenomenon from a developing country perspective. This study reports on BYOD practices exhibited in Tanzanian SMEs. The ... -
Business model innovation: a temporal perspective
(ACIS, 2014)Recent years have seen an explosion in the number of academic and practitioner-oriented publications on business models and business model innovation. Indeed, companies that traditionally focused on product and service ... -
Can Twitter Enhance Food Resilience?: Exploring Community Use of Twitter using Communicative Ecology
(ACIS, 2014)Food resilience - providing affordable access to a nutritionally balanced food supply - is a major sustainability challenge for growing urban populations worldwide, particularly in the developing world. This paper reports ... -
Can we improve participation in university course surveys using mobile tools? A practical experiment
(ACIS, 2014)Student course surveys provide an important feedback mechanism for universities. However the quality of this feedback depends largely on the level of participation. New technologies have enabled course surveys to evolve ... -
Challenges in Managing Knowledge through Medical Record Management: A Case Study of an Australian Hospital
(ACIS, 2014)The healthcare industry produces a huge amount of data and information. The growing of number of patients, diseases, medical research areas as well as the rapid changes in the healthcare environment result in demands for ... -
Chinese Managers, Guanxi, and Using Business Intelligence: A Research Agenda
(ACIS, 2014)China is the world's second largest economy by nominal gross domestic product (GDP) and purchasing power parity (PPP). Despite the considerable amount of IS research in China, little work has been reported on the use of ... -
Cloud Computing and ERP: A Framework of Promises and Challenges
(ACIS, 2014)Enterprise Resource Planning (ERP) systems are an integral component of IT infrastructure in many organizations. A recent trend for ERP is the shift from on-premises infrastructure to the cloud environment through utilization ... -
Collaborative IT Outsourcing in the Public Sector: A Case Analysis of Standard Business Reporting in Australia
(ACIS, 2014)This study provides a case analysis of a successful collaborative information technology outsourcing arrangement in a public sector setting. An endogenous framework depicting four key factors (motivation, decision-making, ... -
Collaborative Network and Firm Performance: Moderating Role of Information System Integration
(ACIS, 2014)The objective of this study is to empirically test not only the direct effects of collaborative network and integrated information systems (IS) on firm performance, but also the moderating role of IS integration along the ... -
Comparison of Redemption of Print and Electronic Coupons
(ACIS, 2014)Promotion via coupons is one of wide-spread marketing tools on Internet. But despite the growth of E-business printed coupons remain in use. We, therefore, compare the performance of printed and electronic coupons as ... -
A Conceptual Framework for Information Security in Public Organizations for E-Government Development
(ACIS, 2014)The rapid development of e-government across the world has exposed critical information in public organizations to the possibility of cybercrime. Information security has become a critical issue that needs to be adequately ... -
Conceptualisation of Digital Traces for the Identification of Informal Networks in Enterprise Social Networks
(ACIS, 2014)Organisations can be understood as organisms exhibiting a formal structure formalised by the “org chart”, and informal structures of emerging networks between employees. The increasing use of Enterprise Social Networks ... -
Constructing the Cultural Repertoire in a Natural Disaster: The Role of Social Media in the Thailand Flood of 2011
(ACIS, 2014)In 2011, Thailand witnessed its worst flooding catastrophe in half a century. In this study, we explored social media as a new and promising weapon to address the physical and morale challenges caused by the natural disaster. ... -
The Construction of Identity Offences Taxonomy: An Australian Context
(ACIS, 2014)The objective of this project is to create an identity crimes taxonomy as a foundation for highlighting the importance of a National Identity Security Strategy (NISS 2012) initiated by the Commonwealth of Australia. The ... -
Consumer’s Persistence in Solving their own Problem with Self-Service Technology
(ACIS, 2014)An increasing range of technology services are now offered on a self-service basis. However, problems with self-service technologies (SSTs) occur at times, even for the best service providers due to the technical error, ... -
A Contingent Model for Evaluating Enterprise Systems' Benefits Using Competing Value Approach
(ACIS, 2014)Enterprise Systems (ES) are complex IT systems adopted by organisations to support business and increased productivity and efficiencies from integration, automation and reengineering of processes, as well as management of ... -
Contradictions in Value Co-Creation in IT-Enabled Services: A Case of Geocaching
(ACIS, 2014)Negative consequences of value co-creation in consumer information systems are rarely assessed in information systems (IS) research. In this empirical case study, we focus on contradictions and structural tensions in ... -
Correction of Data-flow Errors in Workflows
(ACIS, 2014)When a workflow is designed, not only should it be free from control-flow errors like deadlocks and lack of synchronization, but should also be checked for data-flow correctness. Recent approaches have categorized data-flow ...