Submissions from 2016
Understanding Learning Outcome Divide in the Learning Process from a Teachers Perspective: A BYOD Case Study, Janak Adhikari, Anuradha Mathrani, David Parsons, and Chris Scogings
Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach, Carlos Andres Agudelo, Rachelle Bosua, Sean B. Maynard, and Atif Ahmad
Barriers Inhibiting the Development of a Self-Sustaining Virtual Learning Cluster of Schools in New Zealand: The Case of the C-Net Cluster, Arif Ali, Pak Yoong, and Allan Sylvester
Investigating the Impact of Institutional Pressures on Information Security Compliance in Organizations, Ahmed Al-Kalbani, Hepu Deng, Booi Kam, and Julia Zhang
The link between post-implementation learning motivation and enterprise resource planning system usage: a pilot study., Chris Niyi Arasanmi
Mitigating BYOD Information Security Risks, Daniel Alejandro Arregui, Sean B. Maynard, and Atif Ahmad
Effective Use of Self-service Technology by Physically Disabled Individuals, Marjan Aslanzadeh and Byron Keating
Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy, Riza Azmi, William Tibben, and Khin Than Win
Socially-Constructed Metrics for Agile Quality: An Action Research Study, Jo√£o Barata and Sharon Coyle
Evaluation of Telehealth Equipment, Oliver Burmeister, David Ritchie, Alison Devitt, Eevon Chia, and Gregory Dresser
Using Social Media for Business Communication: A Symbolic Interaction Perspective, Renee Rui Chen, Robert M. Davison, and Carol Xiaojuan Ou
Big data in Financial Management a structured literature review and Opportunities for IS research, Sophie Cockcroft
Stress-Based IS Security Compliance: Towards a Conceptual Model, Hiep Cong-Pham, Linda Brennan, and Joan Richardson
ITIL compliance with a Service Perspective: a Review Based on Service-Dominant Logic, Stefan Cronholm and Hannes Göbel
Empirical Evaluation of Action Design Research, Stefan Cronholm, Hannes Göbel, and Anders Hjalmarsson
Analysing Trust Issues in Cloud Identity Environments, Brian Cusack and Eghbal Ghazizadeh
Detecting Slow DDos Attacks on Mobile Devices, Brian Cusack, Raymond Lutui, and Reza Khaleghparast
Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach, Duy Dang-Pham, Siddhi Pittayachawan, and Vince Bruno
Trust-Promoting Seals in Green Information Systems: The Case of Smart Meters and Privacy, Kenan Degirmenci
Towards a Model for Discourse Ethics-based Digital Business Strategy Development, Oliver Degner and Andreas Drechsler
Location privacy acceptance: attitudes to transport-based location-aware mobile applications on a university campus, Peter Eklund, Edward Dou, and Ulrike Gretzel
The Sharing Economy and the Transformative Roles of IS: An Australian Study, Steve Elliot, Ella Hafermalz, Dirk Hovorka, Sebastian Boell, Kai Riemer, and Olivera Marjanovic
The Data Driven Decision RACE in eRetailing, Niklas Eriksson, Mikael Forsström, and Carl-Johan Rosenbröijer
Cloud Computing Adoption: An Effective Tailoring Approach, Mahdi Fahmideh Gholami, Farhad Daneshgar, and Fethi Rabhi
Who’s in to Win?: Participation Rate in a Primary Personal Information Market, Ross Farrelly and Eng Chew
Structural and Behavioural Model for Social Computing Applications, Marie D Fernando, Athula Ginige, and Ana Hol
Inscribing Service into IT Service Management, Hannes Göbel, Stefan Cronholm, and Anders Hjalmarsson
Integrating contextual and online self-reported data for personalized healthcare: a tennis elbow case study, Tian Yu Goh, Frada Burstein, Pari Delir Haghighi, Rachelle Buchbinder, and Margaret Staples
Heinz Zemanek's Almost Forgotten Contributions to the Early Philosophy of Informatics, Stefan Gruner
Understanding Learning Outcomes through Member Needs, Motivation and Satisfaction: the Development of a Conceptual Model, Matt Halliwell, Mark Freeman, and Khin Win
A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective, Mumtaz Abdul Hameed and Nalin Asanka Gamagedara Arachchilage
DESIGN IN COMPLEX ENVIRONMENTS:, Igor Hawryszkiewycz
Country Selection and Impact IT Sourcing: Relationships Between Business Factors and Social Inequality, Allen Higgins and Babak Saadatmandi
Optimising Visual Layout for Training and Learning Technologies, Bruce Hilliard, Jocelyn Armarego, and Tanya McGill
How do environmental enterprise systems contribute to sustainability value? A practitioner-oriented framework, Giang Hoang, Alemayehu Molla, and Pak-Lok Poon
Challenges in Product Lifecycle Management - Evidence from the Automotive Supply Industry, Manuel Holler, Falk Uebernickel, and Walter Brenner
A Theory on Information Security, Craig A. Horne, Atif Ahmad, and Sean B. Maynard
Observer’s Galvanic Skin Response for Discriminating Real from Fake Smiles, Md Zakir Hossain, Tom Gedeon, and Ramesh Sankaranarayana
The influence of personal knowledge management on individual decision making in health care medical treatment, Yi-Mei Huang, David Pauleen, Shane Scahill, and Nazim Taskin
Key Challenges for Establishing CIO Position in the Public Sector of LDCs: A Case of Bangladesh, Bashir Hussain, Ahmed Imran, and Tim Turner
A M-Service Implementation in Large Government Organisation: A Case Study on an M-app in Australia, Mehdi Hussain and Ahmed Imran
Customising Agent Based Analysis Towards Analysis of Disaster Management Knowledge, Dedi Iskandar Inan, Ghassan Beydoun, and Simon Opper
The use of social media by adults with chronic illness: analysing the support mechanisms of four social media platforms, Nwakego Isika, Antonette Mendoza, and Rachelle Bosua
Focusing on non-adopters of broadband: A critical realist perspective, Paul Jackson, Philip Dobson, and Denise Gengatharen
A Conceptual Model for the Application of Business Analytics in the Horizontal Strategic Alliance, John Janosko, Tingru Cui, and Sim Kim Lau
Enhancing rule-based text classification of neurosurgical notes using filtered feature weight vectors, Sedigheh Khademi, Pari Delir Haghighi, Frada Burstein, and Christopher Palmer
Healthcare Consumers’ Voluntary Adoption and Non-Adoption of Electronic Personal Health Records, K. Niki Kunene and Kamila Zysk
The Role of Experience of Practice for Perceptions of a new Technology – The Case of Building Information Modelling, Henrik Linderoth and Anders Isaksson
Boundary Spanning Theory: a Case Study of the Professionalisation of ICT Graduates in the Australian Public Service, Dale MacKrell, Craig McDonald, Fiona Buick, and Dale Kleeman
Facebook Usage During a Flood – a Content Analysis of Two Local Governments’ Facebook Pages, Monika Magnusson
Managing Distribution Logistics Using Enterprise Systems, Sanjay Mathrani
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q), Agata Mccormac, Dragana Calic, Kathryn Parsons, Tara Zwaans, Marcus Butavicius, and Malcolm Pattinson
Understanding the Internet Pitchfork Mob: Internal Revolutionary Activity in Self-Regulated Online Communities, Catherine Olivia McRae, Jean-Gregoire Bernard, and Jocelyn Cranefield
Design methodologies for M-health innovations: a content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md. Rakibul Hoque
An Integrated Perspective on Factors Influencing Online Health-Information Seeking Behaviours, Annette Mills and Nelly Todorova
ICT and Public Service Value Creation in Africa: Efficiency Assessment Using DEA approach, Lucas Mimbi and Felix Bankole
Online patient education design features: are there any differences in opinion based on consumer’s stage of change?, Naffisah Mohd Hassan, Khin Than Win, and Harri Oinas-Kukkonen
Design Considerations for a Virtual Community of Practice for Health Practitioners: A Learner Centred Design Approach, Abdulaziz Murad, Reeva Lederman, Rachelle Bosua, Shanton Chang, and John Wark
Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective, Humza Naseer, Graeme Shanks, Atif Ahmad, and Sean Maynard
Legitimising Information Security Policy during Policy Crafting: Exploring Legitimising Strategies, Elina Niemimaa
Modelling the underlying behavioural antecedents of the digital divide from the ability, motivation and opportunity framework, Adedapo Ojo and Murali Raman
UNDERSTANDING THE DYNAMICS OF BVIT PROCESS: A COMPLEX ADAPTIVE SYSTEMS APPROACH, Mohammad Fakhrul Alam Onik and Erwin Fielt
An Information Systems Perspective on Digital Currencies: A Systematic Literature Review, Osemwonyemwen Oshodin, Alemayehu Molla, and Chin Eang Ong
Self-Disclosure on Facebook: Comparing two Research Organisations, Kathryn Parsons, Dragana Calic, and Carlos Barca
Do retailers leverage consumer social media content for innovation? An exploratory study, Joanne Patroni, Frederik von Briel, and Jan Recker
Infusion of social innovation in outsourcing for developing countries: A case in Nepal, Sojen Pradhan
Governance Policies in IT Service Support, Abhinay Puvvala, Veerendra Kumar Rai, and Rutuja Patil
Course Design Principles to Support the Learning of Complex Information Infrastructures, Corina Raduescu, Jenny Leonard, and Catherine Hardy
Do they read your research? An investigation of practitioners’ use of IT outsourcing and cloud sourcing research, Mohammad Mehdi Rajaeian, Aileen Cater-Steel, and Michael Lane
Attributes, Processes, and Tendencies applied to Government Information Technology Outsourcing, Richard Rannard, Lesley Land, and Ken Stevens
Making Sense of Disruption: A Kuhnian Analysis, Kai Riemer and Robert Johnston
Innovation and flexibility within a Bachelor of Information Systems transnational educational (TNE) program, Erin Roehrer, Leonie Ellis, and Dean Steer
Managing Inherent Conflicts in Agile Distributed Development: Evidence from Product Development, Ashay Saxena, Shankar Venkatagiri, and Rajendra Bandi
Understanding the Curriculum Gap in Systems Analysis and Design: An Exploratory Study, Mali Senapathi
Measuring Mobile Portal User Satisfaction, Daisy Seng, Ly Fie Sugianto, and Carla Wilkin
Hello Computer: Towards a Research Agenda for Conceptualising “Presence” in Human-Computer Engagement, Mike Seymour and Ella Hafermalz
Design Science Research: Building evaluation into the construction of indigenous cultural artefacts in New Zealand, Kevin Shedlock, Marta Vos, and Sue Chard
Compliance Principles for Decision Management Solutions at the Dutch Government, Koen Smit, Martijn Zoet, and Raymond Slot
A SWOT Analysis of the IS Academic Discipline in Australia, Robert Smyth, Guy Gable, and Graham Pervan
Measuring IS success of e-government: A case study of the disability sector in Australia, Gary Sterrenberg and Byron Keating
A Case Study of Stakeholder Perspectives on a Flipped Classroom Initiative Using an Organizational Routines Lens, Mary Tate, Rory Sudfeld, Jennifer Campbell-Meier, and Mark McGuire
It's only pixels, badges, and stars: On the economic value of reputation on Airbnb, Timm Teubner, Norman Saade, Florian Hawlitschek, and Christof Weinhardt
Assessing student engagement in cross campus work in learning: a teaching case in corporate network management, William Tibben and Shanmuga Sundram
Developing Acquisition IS Integration Capabilities: The Learning Processes of Novice Acquirers, Peter Wynne
An Investigation of How and Why Managers Use Tablets to Support Decision Making, Meng Xiao, Caddie Gao, and Rob Meredith
The Multidimensionality of IT Outsourcing Risks, Anna Zaitsev and Kenneth Stevens
Understanding Information System Innovation: Moving beyond adoption and diffusion, Badrunnesa Zaman and Erwin Fielt
Adding Dimension to Content: Immersive Virtual Reality for e-Commerce, Wanxian Zeng and Alex Richardson
Lost in Translation: The Influence of Translated Information Quality on Foreign Shoppers, Wanxian Zeng and Alex Richardson
The Use of Chinese-language Internet Information about Cancer by Chinese Health Consumers, Xinxing Zhang, James Warren, and Yulong Gu
Investigating the Nonlinear and Conditional Effects of Trust on Effective Customer Retention --The Role of Institutional Contexts, Haiyun Zou, Israr Qureshi, Yulin Fang, Heshan Sun, Kai Lim, Elaine Ramsey, and Patrick McCole