• Factors Affecting Business Process and Business Rule Integration

      Wang, Wei; Indulska, Marta; Sadiq, Shazia (ACIS, 2014)
      Information systems architectures are becoming increasingly complex and fragmented. As a result, organizations struggle to cope with change propagation, compliance management and interoperability, to name a few. Two major ...
    • Fashion beyond representation

      Shand, Peter (Textile and Design Lab and Colab at Auckland University of Technology, 2014)
      The promise of transformation is fashion’s most significant gift. In ideal form, fashion is a site of profound elasticity. That ideal appears as both a reflection of constant becoming with its attendant stimulation and as ...
    • The fashion system and the ephemeral: ballet and costume

      O’Brien, Caroline (Textile and Design Lab and Colab at Auckland University of Technology, 2014)
      This paper interrogates the theory that dress is synonymous with the identity of the ballerina. Rooted in the seventeenth century French court, classical ballet is perhaps our last vestige of aristocratic manners and ...
    • Feasibility Study Of Lecturers’ Acceptance Of E-Assessment

      Imtiaz, Md. Athar; Maarop, Nurazean (ACIS, 2014)
      Technology acceptance studies are an effective way of gauging future system use and developing a robust system. In the area of e-learning numerous technology acceptance studies exist. However, rarely research works have ...
    • Flirting with uncertainty: mutability, metamorphosis, and fashionability in the Greco-Roman imagination

      McFerrin, Neville (Textile and Design Lab and Colab at Auckland University of Technology, 2014)
      For many ancient Greek and Roman men, fashion was fear: fear of the unknown, fear of the other, but most importantly, fear of the uncontrollable. The distinctly female ability to adopt and maintain multiple identities- ...
    • A Framework for Analysing Types of User Information on Social Networking Sites

      Kurian, Jayan; Singh, Mohini (ACIS, 2014)
      Social Networking Sites (SNS) are web-based applications used by a very large number of users to share different types of information. Some of the information on SNS is for communication and others for collaboration and ...
    • A Framework for Clarifying the Goal and Implementation of ISO

      Al-Hameed, Layla; Dobson, Philip; Jackson, Paul (ACIS, 2014)
      Many organizations are dissatisfied with the outcomes of ISO implementations. This paper proposes that this dissatisfaction is often a consequence of a lack of clarity as to the goal of the implementation and the lack of ...
    • A Framework for Qualitative Analysis of Focus Group Data in Information Systems

      Nili, Alireza; Tate, Mary; Johnstone, David; Gable, Guy (ACIS, 2014)
      Focus groups are a popular qualitative research method for information systems researchers. However, compared with the abundance of research articles and handbooks on planning and conducting focus groups, surprisingly, ...
    • Frozen waves: exploring the transformation between sound and object

      van Melle, Gerbrand; Marks, Stefan (Textile and Design Lab and Colab at Auckland University of Technology, 2014)
      In the project Frozen Waves, audio recordings are translated into physical objects and vice versa. Time is temporarily captured in space – space is released back into time. In doing so, the potential of visual music ...
    • Games people play: social media and recruitment

      Dery, Kristine; Tansley, Carole; Hafermalz, Ella (ACIS, 2014)
      Gamification in organisations is not new and is typically used to modify the behaviours and practices of employees to deliver organizational value. Recent developments in digital technologies have, however, enabled new ...
    • A Generalized Threat Taxonomy for Cloud Computing

      Ahmed, Monjur; Litchfield, Alan T; Ahmed, Shakil (ACIS, 2014)
      This paper presents a genre-based, generalized threat taxonomy for cloud computing. Cloud computing provides numerous possibilities and challenges but the nature of cloud computing exposes the resources of a cloud architecture ...
    • Handheld Wireless Devices and Opinions of Physicians in Healthcare Environment: A case of Pakistan

      Halliwell, Matthew; Freeman, Mark (ACIS, 2014)
      This paper examines the role of wireless handheld devices in the Pakistani healthcare environment using a quantitative approach. This study identifies a list of barriers and drivers, and a factor analysis of the qualitative ...
    • Healthcare Social Question Answering: Concept Mapping and Cluster Analysis based on Graph Theory

      Blooma, Mohan John; Huy, Tran Duc; Wickramasinghe, Nilmini (ACIS, 2014)
      Healthcare Social Question Answering (SQA) services are dedicated platforms for users to freely ask questions regarding their health related concerns and respond to or rate other users’ questions. To have a deeper insight ...
    • Healthy Community and Healthy Commons: ‘Opensourcing’ as a Sustainable Model of Software Production

      Naparat, Damrongsak; Cahalane, Michael; Finnegan, Patrick (ACIS, 2014)
      Many commercial software firms rely on opensourcing as a viable model of software production. Opensourcing is a specific form of interaction between firms and open source software (OSS) communities for collaboratively ...
    • How Context Impacts on Media Choice

      Stieglitz, Stefan; Brockmann, Tobias; Mirbabaie, Milad (ACIS, 2014)
      The relevance of mobile working is steadily increasing. Based on new mobile devices (e.g. smartphones) and their innovative functionalities, an increasing amount of data is being made available ubiquitously. As a result, ...
    • How should we teach the logic of BPM? Comparing e-learning and face-to-face setting in situated learning

      Leyer, Michael; Wang, Minhong; Moormann, Juergen (ACIS, 2014)
      Knowing the fundamental idea of Business Process Management (BPM) is essential for students to understand and connect concepts of BPM and to develop appropriate information systems (IS). The idea of BPM refers to the logic ...
    • How to Communicate Evaluation Work in Design Science Research? An Exemplar Case Study

      Shrestha, Anup; Cater-Steel, Aileen; Toleman, Mark (ACIS, 2014)
      How should we communicate evaluation work in design science research (DSR)? A case study based on our industry collaboration research project encountered this challenge after finding limited guidance on a structure to ...
    • Identifying a Game Console Vulnerability and Potential Exploitation for eBusiness Attacks

      Cusack, Brian; Robinson, Nick (ACIS, 2014)
      Game Information System (IS) consoles are used by millions of players at any one time to access the Internet and information resources. In this research we questioned the security of these systems and evaluated one identified ...
    • Identifying Gaps in Institutional Theory

      Pishdad, Azadeh; Koronios, Andy; Reich, Blaize Horner; Geursen, Gus (ACIS, 2014)
      Institutional theory has been applied to various dimensions of extant IS literature. The major part of this literature, however, is dedicated to studying the influence of institutional isomorphic mechanisms at macro level ...
    • Imaginative voyaging: fashion practice as a ‘site’ for wonder and enchantment

      Chant, Armando (Textile and Design Lab and Colab at Auckland University of Technology, 2014)
      The aim of this paper is to explore the state of wonder within a transitional and transformative context and its potential to inform experimental fashion practices. In particular it will focus on the emotionally generative ...