Follow

Submissions from 2016

PDF

Understanding Learning Outcome Divide in the Learning Process from a Teachers Perspective: A BYOD Case Study, Janak Adhikari, Anuradha Mathrani, David Parsons, and Chris Scogings

PDF

Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach, Carlos Andres Agudelo, Rachelle Bosua, Sean B. Maynard, and Atif Ahmad

PDF

Barriers Inhibiting the Development of a Self-Sustaining Virtual Learning Cluster of Schools in New Zealand: The Case of the C-Net Cluster, Arif Ali, Pak Yoong, and Allan Sylvester

PDF

Investigating the Impact of Institutional Pressures on Information Security Compliance in Organizations, Ahmed Al-Kalbani, Hepu Deng, Booi Kam, and Julia Zhang

PDF

The link between post-implementation learning motivation and enterprise resource planning system usage: a pilot study., Chris Niyi Arasanmi

PDF

Mitigating BYOD Information Security Risks, Daniel Alejandro Arregui, Sean B. Maynard, and Atif Ahmad

PDF

Effective Use of Self-service Technology by Physically Disabled Individuals, Marjan Aslanzadeh and Byron Keating

PDF

Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy, Riza Azmi, William Tibben, and Khin Than Win

PDF

Socially-Constructed Metrics for Agile Quality: An Action Research Study, Jo√£o Barata and Sharon Coyle

PDF

Evaluation of Telehealth Equipment, Oliver Burmeister, David Ritchie, Alison Devitt, Eevon Chia, and Gregory Dresser

PDF

Using Social Media for Business Communication: A Symbolic Interaction Perspective, Renee Rui Chen, Robert M. Davison, and Carol Xiaojuan Ou

PDF

Big data in Financial Management a structured literature review and Opportunities for IS research, Sophie Cockcroft

PDF

Stress-Based IS Security Compliance: Towards a Conceptual Model, Hiep Cong-Pham, Linda Brennan, and Joan Richardson

PDF

ITIL compliance with a Service Perspective: a Review Based on Service-Dominant Logic, Stefan Cronholm and Hannes Göbel

PDF

Empirical Evaluation of Action Design Research, Stefan Cronholm, Hannes Göbel, and Anders Hjalmarsson

PDF

Analysing Trust Issues in Cloud Identity Environments, Brian Cusack and Eghbal Ghazizadeh

PDF

Detecting Slow DDos Attacks on Mobile Devices, Brian Cusack, Raymond Lutui, and Reza Khaleghparast

PDF

Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach, Duy Dang-Pham, Siddhi Pittayachawan, and Vince Bruno

PDF

Trust-Promoting Seals in Green Information Systems: The Case of Smart Meters and Privacy, Kenan Degirmenci

PDF

Towards a Model for Discourse Ethics-based Digital Business Strategy Development, Oliver Degner and Andreas Drechsler

PDF

Location privacy acceptance: attitudes to transport-based location-aware mobile applications on a university campus, Peter Eklund, Edward Dou, and Ulrike Gretzel

PDF

The Sharing Economy and the Transformative Roles of IS: An Australian Study, Steve Elliot, Ella Hafermalz, Dirk Hovorka, Sebastian Boell, Kai Riemer, and Olivera Marjanovic

PDF

The Data Driven Decision RACE in eRetailing, Niklas Eriksson, Mikael Forsström, and Carl-Johan Rosenbröijer

PDF

Cloud Computing Adoption: An Effective Tailoring Approach, Mahdi Fahmideh Gholami, Farhad Daneshgar, and Fethi Rabhi

PDF

Who’s in to Win?: Participation Rate in a Primary Personal Information Market, Ross Farrelly and Eng Chew

PDF

Structural and Behavioural Model for Social Computing Applications, Marie D Fernando, Athula Ginige, and Ana Hol

PDF

Inscribing Service into IT Service Management, Hannes Göbel, Stefan Cronholm, and Anders Hjalmarsson

PDF

Integrating contextual and online self-reported data for personalized healthcare: a tennis elbow case study, Tian Yu Goh, Frada Burstein, Pari Delir Haghighi, Rachelle Buchbinder, and Margaret Staples

PDF

Heinz Zemanek's Almost Forgotten Contributions to the Early Philosophy of Informatics, Stefan Gruner

PDF

Understanding Learning Outcomes through Member Needs, Motivation and Satisfaction: the Development of a Conceptual Model, Matt Halliwell, Mark Freeman, and Khin Win

PDF

A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective, Mumtaz Abdul Hameed and Nalin Asanka Gamagedara Arachchilage

PDF

DESIGN IN COMPLEX ENVIRONMENTS:, Igor Hawryszkiewycz

PDF

Country Selection and Impact IT Sourcing: Relationships Between Business Factors and Social Inequality, Allen Higgins and Babak Saadatmandi

PDF

Optimising Visual Layout for Training and Learning Technologies, Bruce Hilliard, Jocelyn Armarego, and Tanya McGill

PDF

How do environmental enterprise systems contribute to sustainability value? A practitioner-oriented framework, Giang Hoang, Alemayehu Molla, and Pak-Lok Poon

PDF

Challenges in Product Lifecycle Management - Evidence from the Automotive Supply Industry, Manuel Holler, Falk Uebernickel, and Walter Brenner

PDF

A Theory on Information Security, Craig A. Horne, Atif Ahmad, and Sean B. Maynard

PDF

Observer’s Galvanic Skin Response for Discriminating Real from Fake Smiles, Md Zakir Hossain, Tom Gedeon, and Ramesh Sankaranarayana

PDF

The influence of personal knowledge management on individual decision making in health care medical treatment, Yi-Mei Huang, David Pauleen, Shane Scahill, and Nazim Taskin

PDF

Key Challenges for Establishing CIO Position in the Public Sector of LDCs: A Case of Bangladesh, Bashir Hussain, Ahmed Imran, and Tim Turner

PDF

A M-Service Implementation in Large Government Organisation: A Case Study on an M-app in Australia, Mehdi Hussain and Ahmed Imran

PDF

Customising Agent Based Analysis Towards Analysis of Disaster Management Knowledge, Dedi Iskandar Inan, Ghassan Beydoun, and Simon Opper

PDF

The use of social media by adults with chronic illness: analysing the support mechanisms of four social media platforms, Nwakego Isika, Antonette Mendoza, and Rachelle Bosua

PDF

Focusing on non-adopters of broadband: A critical realist perspective, Paul Jackson, Philip Dobson, and Denise Gengatharen

PDF

A Conceptual Model for the Application of Business Analytics in the Horizontal Strategic Alliance, John Janosko, Tingru Cui, and Sim Kim Lau

PDF

Enhancing rule-based text classification of neurosurgical notes using filtered feature weight vectors, Sedigheh Khademi, Pari Delir Haghighi, Frada Burstein, and Christopher Palmer

PDF

Healthcare Consumers’ Voluntary Adoption and Non-Adoption of Electronic Personal Health Records, K. Niki Kunene and Kamila Zysk

PDF

The Role of Experience of Practice for Perceptions of a new Technology – The Case of Building Information Modelling, Henrik Linderoth and Anders Isaksson

PDF

Boundary Spanning Theory: a Case Study of the Professionalisation of ICT Graduates in the Australian Public Service, Dale MacKrell, Craig McDonald, Fiona Buick, and Dale Kleeman

PDF

Facebook Usage During a Flood – a Content Analysis of Two Local Governments’ Facebook Pages, Monika Magnusson

PDF

Managing Distribution Logistics Using Enterprise Systems, Sanjay Mathrani

PDF

Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q), Agata Mccormac, Dragana Calic, Kathryn Parsons, Tara Zwaans, Marcus Butavicius, and Malcolm Pattinson

PDF

Understanding the Internet Pitchfork Mob: Internal Revolutionary Activity in Self-Regulated Online Communities, Catherine Olivia McRae, Jean-Gregoire Bernard, and Jocelyn Cranefield

PDF

Design methodologies for M-health innovations: a content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md. Rakibul Hoque

PDF

An Integrated Perspective on Factors Influencing Online Health-Information Seeking Behaviours, Annette Mills and Nelly Todorova

PDF

ICT and Public Service Value Creation in Africa: Efficiency Assessment Using DEA approach, Lucas Mimbi and Felix Bankole

PDF

Online patient education design features: are there any differences in opinion based on consumer’s stage of change?, Naffisah Mohd Hassan, Khin Than Win, and Harri Oinas-Kukkonen

PDF

Design Considerations for a Virtual Community of Practice for Health Practitioners: A Learner Centred Design Approach, Abdulaziz Murad, Reeva Lederman, Rachelle Bosua, Shanton Chang, and John Wark

PDF

Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective, Humza Naseer, Graeme Shanks, Atif Ahmad, and Sean Maynard

PDF

Legitimising Information Security Policy during Policy Crafting: Exploring Legitimising Strategies, Elina Niemimaa

PDF

Modelling the underlying behavioural antecedents of the digital divide from the ability, motivation and opportunity framework, Adedapo Ojo and Murali Raman

PDF

UNDERSTANDING THE DYNAMICS OF BVIT PROCESS: A COMPLEX ADAPTIVE SYSTEMS APPROACH, Mohammad Fakhrul Alam Onik and Erwin Fielt

PDF

An Information Systems Perspective on Digital Currencies: A Systematic Literature Review, Osemwonyemwen Oshodin, Alemayehu Molla, and Chin Eang Ong

PDF

Self-Disclosure on Facebook: Comparing two Research Organisations, Kathryn Parsons, Dragana Calic, and Carlos Barca

PDF

Do retailers leverage consumer social media content for innovation? An exploratory study, Joanne Patroni, Frederik von Briel, and Jan Recker

PDF

Infusion of social innovation in outsourcing for developing countries: A case in Nepal, Sojen Pradhan

PDF

Governance Policies in IT Service Support, Abhinay Puvvala, Veerendra Kumar Rai, and Rutuja Patil

PDF

Course Design Principles to Support the Learning of Complex Information Infrastructures, Corina Raduescu, Jenny Leonard, and Catherine Hardy

PDF

Do they read your research? An investigation of practitioners’ use of IT outsourcing and cloud sourcing research, Mohammad Mehdi Rajaeian, Aileen Cater-Steel, and Michael Lane

PDF

Attributes, Processes, and Tendencies applied to Government Information Technology Outsourcing, Richard Rannard, Lesley Land, and Ken Stevens

PDF

Making Sense of Disruption: A Kuhnian Analysis, Kai Riemer and Robert Johnston

PDF

Innovation and flexibility within a Bachelor of Information Systems transnational educational (TNE) program, Erin Roehrer, Leonie Ellis, and Dean Steer

PDF

Managing Inherent Conflicts in Agile Distributed Development: Evidence from Product Development, Ashay Saxena, Shankar Venkatagiri, and Rajendra Bandi

PDF

Understanding the Curriculum Gap in Systems Analysis and Design: An Exploratory Study, Mali Senapathi

PDF

Measuring Mobile Portal User Satisfaction, Daisy Seng, Ly Fie Sugianto, and Carla Wilkin

PDF

Hello Computer: Towards a Research Agenda for Conceptualising “Presence” in Human-Computer Engagement, Mike Seymour and Ella Hafermalz

PDF

Design Science Research: Building evaluation into the construction of indigenous cultural artefacts in New Zealand, Kevin Shedlock, Marta Vos, and Sue Chard

PDF

Compliance Principles for Decision Management Solutions at the Dutch Government, Koen Smit, Martijn Zoet, and Raymond Slot

PDF

A SWOT Analysis of the IS Academic Discipline in Australia, Robert Smyth, Guy Gable, and Graham Pervan

PDF

Measuring IS success of e-government: A case study of the disability sector in Australia, Gary Sterrenberg and Byron Keating

PDF

A Case Study of Stakeholder Perspectives on a Flipped Classroom Initiative Using an Organizational Routines Lens, Mary Tate, Rory Sudfeld, Jennifer Campbell-Meier, and Mark McGuire

PDF

It's only pixels, badges, and stars: On the economic value of reputation on Airbnb, Timm Teubner, Norman Saade, Florian Hawlitschek, and Christof Weinhardt

PDF

Assessing student engagement in cross campus work in learning: a teaching case in corporate network management, William Tibben and Shanmuga Sundram

PDF

Developing Acquisition IS Integration Capabilities: The Learning Processes of Novice Acquirers, Peter Wynne

PDF

An Investigation of How and Why Managers Use Tablets to Support Decision Making, Meng Xiao, Caddie Gao, and Rob Meredith

PDF

The Multidimensionality of IT Outsourcing Risks, Anna Zaitsev and Kenneth Stevens

PDF

Understanding Information System Innovation: Moving beyond adoption and diffusion, Badrunnesa Zaman and Erwin Fielt

PDF

Adding Dimension to Content: Immersive Virtual Reality for e-Commerce, Wanxian Zeng and Alex Richardson

PDF

Lost in Translation: The Influence of Translated Information Quality on Foreign Shoppers, Wanxian Zeng and Alex Richardson

PDF

The Use of Chinese-language Internet Information about Cancer by Chinese Health Consumers, Xinxing Zhang, James Warren, and Yulong Gu

PDF

Investigating the Nonlinear and Conditional Effects of Trust on Effective Customer Retention --The Role of Institutional Contexts, Haiyun Zou, Israr Qureshi, Yulin Fang, Heshan Sun, Kai Lim, Elaine Ramsey, and Patrick McCole