[AISWorld] New Special Section: Selected Papers from the Australasian Conference on Information Systems (ACIS) 2019
Ajis Editor
ajis.eic at gmail.com
Tue Apr 6 22:36:24 EDT 2021
Hi,
The *Australasian Journal of In*formation Systems has just published its
latest special section with selected papers from the Australasian
Conference on Information Systems (ACIS) 2019
Preface to Special Section of Invited Papers from the 30th Australasian
Conference on Information Systems
Deborah Bunker, Annette Mills, Doug Vogel
The Coevolution of Routines and IT Systems in IT-enabled Organizational
Transformation as an Instance of Digital Transformation: A Social
Constructivist Perspective
Faqir Taj,Karlheinz Kautz,Vince Bruno
karlheinz.kautz at rmit.edu.au
doi: https://doi.org/10.3127/ajis.v25i0.2855
This paper proposes a conceptual framework to study the phenomenon of
IT-enabled Organizational Transformation (IT-enabled OT) as a coevolution
process of organizational routines and a new IT system. The framework’s
objective is to understand IT-enabled OT in a holistic and integrated
manner by investigating how actors perceive, interpret, appropriate, and
enact, the new IT system in their work routines as well as how they align
the new system and these routines with the social order and structures of
the organization. It allows the examination of the reciprocal interactions
between different aspects of organizational routines and a new IT system to
enhance the understanding of how change unfolds in an organization during
the implementation, the adoption, use, and adaptation of a new IT system.
We illustrate the scope, the analytic and conceptual strength of the
framework with a number of examples from the literature and, lastly,
discuss its ontological positioning. The paper concludes with a call for
further research to empirically validate and refine the proposed framework.
#ITenabledOT #organizationalroutines #coevolution #appropriation #enactment
Compliance with security guidelines in teenagers: the conflicting role of
peer influence and personal norms
Florence Mwagwabi, Jhee Hee Jiow
F.Mwagwabi at murdoch.edu.au
doi: https://doi.org/10.3127/ajis.v25i0.2953
What drives teenagers to comply with computer password guidelines? Using an
extended form of protection motivation theory (PMT) (Rogers, 1983), we
found that even if teenage computer users believe they are susceptible to
being hacked, or that being hacked would be detrimental, it has no bearing
on their password choices. Other motives outside of PMT also drive teenage
security behaviour. Personal norms fully mediate the relationship between
the perceived severity of threat and compliance intentions such that
perceived severity is not sufficient to encourage compliance. Teenagers
must actually feel obligated to comply. While personal norms may encourage
compliance, concerns about feeling embarrassed or ashamed if their social
media accounts are hacked into actually encourages compliance. On the other
hand, peer influence, such as the fear of being teased about someone
hacking into their account, discourages compliance. Our study contributes
to understanding early security practices and highlights potential
differences between adult and teenage behaviours to consider in future
studies. For example, our findings suggest that password security
guidelines alone will not suffice to ensure teenage compliance; they may
need enforced password rules at the authentication level to eliminate any
opportunity to violate password rules. Our study will benefit children and
parents as well as organizations that have changed work practices to enable
employees to work from home, but which places children in danger of
clicking on malicious links on their parents’ computers. To our knowledge,
this is the first password security study that applies PMT to examine
computer-based security behaviours in teenagers.
#protectionmotivationtheory #PMT #teenagecybersecuritybehaviour
#compliancebehavioursinteenagers #passwordcomplianceintention
#socialmediapasswordpractices #peerinfluence #personalnorms
#anticipatedguilt #anticipatedembarrassment
Decision Support Systems in the Context of Cyber-Physical Systems:
Influencing Factors and Challenges for the Adoption in Production
Scheduling
Pascal Freier, Matthias Schumann
pfreier at uni-goettingen.de
doi: https://doi.org/10.3127/ajis.v25i0.2849
Cyber-physical systems promise a complete networking of all actors and
resources involved in production and thus an improved availability of
information. In this context decision support systems enable appropriate
processing and presentation of the captured data. In particular, production
scheduling could benefit from this, since it is responsible for the
short-term planning and control of released orders. Since decision support
systems and cyber-physical systems together are not yet widely used in
production scheduling, the aim of this research study is to analyse the
adoption of these technologies. In order to do so, we conducted a
qualitative interview study with experts on production scheduling. Thereby,
we identified eleven influencing factors and 22 related challenges, which
affect the adoption of decision support systems in production scheduling in
the context of cyber-physical systems. We further discuss and assess the
identified influencing factors based on the interview study. The results
help to explain and improve the adoption of those systems and can serve as
a starting point for their development.
#decisionsupportsystem #productionscheduling #cyberphysicalsystems
#industry40 #challenges
A Conceptual Tool to Eliminate Filter Bubbles in Social Networks
Alireza Amrollahi
ali.amrollahi at mq.edu.au
doi: https://doi.org/10.3127/ajis.v25i0.2867
Reliance on social media as a source of information has lead to several
challenges, including the limitation of sources to viewers’ preferences and
desires, also known as filter bubbles. The formation of filter bubbles is a
known risk to democracy. It can bring negative consequences like
polarisation of the society, users’ tendency to extremist viewpoints and
the proliferation of fake news. Previous studies have focused on specific
aspects and paid less attention to a holistic approach for eliminating the
notion. The current study, however, aims to propose a model for an
integrated tool that assists users in avoiding filter bubbles in social
networks. To this end, a systematic literature review has been undertaken,
and initially, 571 papers in six top-ranked scientific databases have been
identified. After excluding irrelevant studies and performing an in-depth
analysis of the remaining papers, a classification of research studies is
proposed. This classification is then used to introduce an overall
architecture for an integrated tool that synthesises all previous studies
and offers new features for avoiding filter bubbles. The study explains the
components and features of the proposed architecture and concludes with a
list of implications for the recommended tool.
#filterbubble #socialnetworks #prescriptivestudy #informationbubble
Intelligent agent based framework to augment warehouse management systems
for dynamic demand environments
Tania Binos, Vince Bruno,Arthur Adamopoulos
binos.tania at rmit.edu.au
doi: https://doi.org/10.3127/ajis.v25i0.2845
Warehouses are being impacted by increasing e-commerce and omni-channel
commerce. The design of current WMSs (Warehouse Management Systems) may not
be suitable to this mode of operation. The golden rule of material handling
is smooth product flow, but there are day-to-day operational issues that
occur in the warehouse that can impact this and order fulfilment, resulting
in disruptions. Standard operational process is paramount to warehouse
operational control but may preclude a dynamic response to real-time
operational constraints. The growth of IoT (Internet of Things) sensor and
data analytics technology provide new opportunities for designing warehouse
management systems that detect and reorganise around real-time constraints
to mitigate the impact of day-to-day warehouse operational issues. This
paper presents the design and development stage of a design science
methodology of an intelligent agent framework for basic warehouse
management systems. This framework is distributed, is structured around
operational constraints and includes the human operator at operational and
decision support levels. An agent based simulation was built to demonstrate
the viability of the framework.
#warehousemanagementsystems #distributedintelligence #softwareagents
#decisionsupport
-=-=-=-
*Call for Papers*
AJIS publishes high quality contributions to the global Information Systems
(IS) discipline with an emphasis on theory and practice on the Australasian
context.
Topics cover core IS theory development and application (the nature of
data, information and knowledge; formal representations of the world, the
interaction of people, organisations and information technologies; the
analysis, design and deployment of information systems; the impacts of
information systems on individuals, organisations and society), IS domains
(e-business, e-government, e-learning, e-law, etc) and IS research
approaches.
Research and conceptual development based in a very wide range of
epistemological methods are welcomed.
All manuscripts undergo double blind reviewing by at least 2 well qualified
reviewers. Their task is to provide constructive, fair, and timely advice
to authors and editor.
AJIS welcomes research and conceptual development of the IS discipline
based
in a very wide range of epistemologies. Different types of research paper
need to be judged by different criteria. Here are some assessment criteria
that may be applied:
• Relevance - topic or focus is part of the IS discipline.
• Effectiveness - paper makes a significant contribution to the IS
body of knowledge.
• Impact - paper will be used for further research and/or practice.
• Uniqueness - paper is innovative, original & unique.
• Conceptual soundness - theory, model or framework made explicit.
• Argument - design of the research or investigation is sound;
methods appropriate.
• Clarity - Topic is clearly stated; illustrations, charts & examples
support content.
• Reliability - data available; replication possible.
• References - sound, used appropriately, and sufficient –
appropriate AJIS articles referenced
• Style - appropriate language, manuscript flows.
This journal provides immediate open access to its content on the principle
that making research freely available to the public supports a greater
global exchange of knowledge.
AJIS has been published since 1993 and appears in the Index of Information
Systems Journals, is ranked "A" by both the Australian Council of
Professors and Heads of Information Systems and the Australian Business
Deans' Council.
In addition to web distribution, AJIS is distributed by EBSCO, it is listed
in Cabell's International Directory and is indexed by EBSCO, Elsevier,
Scopus and the Directory of Open Access Journals.
Thanks for the continuing interest in our work,
Cheers
Professor Karlheinz Kautz
Editor-in-Chief, Australasian Journal of Information Systems
http://journal.acs.org.au/index.php/ajis/
More information about the AISWorld
mailing list