<?xml version='1.0' encoding='utf-8'?>
<doi_batch xmlns="http://www.crossref.org/schema/5.4.0" xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/5.4.0 http://data.crossref.org/schemas/crossref5.4.0.xsd" version="5.4.0"><head><doi_batch_id>c00e31c9-7b8f-42ff-b69d-cb5dee8afaef</doi_batch_id><timestamp>20260428143823</timestamp><depositor><depositor_name>Depositor Name</depositor_name><email_address>depositor_email@address.com</email_address></depositor><registrant>RUA Metadata Exporter</registrant></head><body><book book_type="edited_book"><book_series_metadata language="en"><series_metadata><titles><title>Conferences</title></titles><issn media_type="print">xxxx-xxxx</issn></series_metadata><contributors><person_name sequence="first" contributor_role="editor"><given_name /><surname>Australasian Conference on Information Systems</surname></person_name></contributors><titles><title>Australasian Conference on Information Systems 2018</title></titles><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><isbn media_type="electronic">978-0-6481242-4-5</isbn><publisher><publisher_name>UTS ePRESS</publisher_name><publisher_place>Sydney</publisher_place></publisher><ai:program name="AccessIndicators"><ai:free_to_read /><ai:license_ref>http://creativecommons.org/licenses/by-nc-nd/4.0/</ai:license_ref></ai:program><doi_data><doi>10.5130/acis2018</doi><resource>https://uplopen.com/books/e/10.5130/acis2018</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/f8ac0307-ba34-4a13-aaa5-7b5339f2f33b.pdf</resource></item></collection><collection property="text-mining"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/f8ac0307-ba34-4a13-aaa5-7b5339f2f33b.pdf</resource></item></collection></doi_data></book_series_metadata><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Karlheinz</given_name><surname>Kautz</surname><affiliations><institution><institution_name>School of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Gro</given_name><surname>Bjerknes</surname><affiliations><institution><institution_name>Faculty of IT Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Julie</given_name><surname>Fisher</surname><affiliations><institution><institution_name>Melbourne, Australia</institution_name></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Tomas</given_name><surname>Jensen</surname><affiliations><institution><institution_name>Communication, Knowledge &amp; Change, Cairns</institution_name></institution></affiliations></person_name></contributors><titles><title>Distributed Participatory Design in Crowdsourced Information Systems Development</title></titles><jats:abstract abstract-type="long"><jats:p>Distributed participatory design (DPD) is an approach to information systems development (ISD) where different stakeholders participate in the development and design of information systems in distributed design teams which are mostly online on Internet, web-based, and social media platforms. User participation in online DPD projects is primarily voluntary and the participants are typically unaffiliated with the development organisation. Going beyond individual methods, techniques, and practices and to extend research on participatory approaches to ISD beyond conventional settings, roles and types of participants, we are interested in how DPD projects in crowdsourced ISD are managed and performed in their entirety. To answer this research question we studied a case of DPD in crowdsourced ISD in the context of a DPD project which engaged Pacific Youth in the development of a digital game. As contemporary ISD is generally acknowledged as a complex activity we apply complex adaptive systems (CAS) theory to better understand and make recommendations for ISD practice.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.aa</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.aa</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/b0bdad46-305d-4656-8f11-7fce9c441d22.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Subasinghage Maduka</given_name><surname>Nuwangi</surname><affiliations><institution><institution_name>Auckland University of Technology</institution_name><institution_id type="ror">https://ror.org/01zvqw119</institution_id><institution_department>Business Information Systems Department</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Darshana</given_name><surname>Sedera</surname><affiliations><institution><institution_name>Faculty of Information Technology Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id></institution></affiliations></person_name></contributors><titles><title>Too Tight - Too Loose: Controlling Lessons from a Failed IS Development Project</title></titles><jats:abstract abstract-type="long"><jats:p>Information Systems Development outsourcing (ISD-outsourcing) projects are notorious for not providing agreed deliverables within the stipulated time and budget. More alarmingly, it is estimated that 19% of ISD-outsourcing projects fail outright (Hastie and Wojewod 2015). This study investigates an ISD-outsourcing failure case which was attributed to issues in the requirements engineering process. Adopting a ‘control theory’ perspective and leveraging case study approach, we examine how the weaknesses in control portfolio contributed to project failure. We attribute the failure not to the absence of control portfolios, rather (i) employing particular control mechanisms incorrectly depending on the phase of requirements engineering process, (ii) dominance of a particular control mechanism, and (iii) insufficiency of particular control mechanisms.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ab</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ab</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/86279912-8400-454a-9e81-699c78f706ec.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Kent</given_name><surname>Ramchand</surname><affiliations><institution><institution_name>Swinburne University of Technology</institution_name><institution_id type="ror">https://ror.org/031rekg67</institution_id><institution_department>School of Computer Science and Software Engineering</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mohan Baruwal</given_name><surname>Chhetri</surname><affiliations><institution><institution_name>Swinburne University of Technology</institution_name><institution_id type="ror">https://ror.org/031rekg67</institution_id><institution_department>School of Computer Science and Software Engineering</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ryszard</given_name><surname>Kowalczyk</surname><affiliations><institution><institution_name>Swinburne University of Technology</institution_name><institution_id type="ror">https://ror.org/031rekg67</institution_id><institution_department>School of Computer Science and Software Engineering</institution_department></institution></affiliations></person_name></contributors><titles><title>Towards a Cloud Architectural Decision Framework using Case-based Reasoning and Rule-based Reasoning</title></titles><jats:abstract abstract-type="long"><jats:p>Correct decision-making about the cloud platform architecture is crucial for the success of any cloud migration project; bad decisions can lead to undesirable consequences including project delays, budget overruns, application instability, below-par performance and creation of technical debt. Rule-Based Reasoning (RBR), a popular approach for solving clearly defined problems, can be used for cloud platform recommendation if a comprehensive set of requirements are available. However, the responsibility of decision-making is increasingly moving away from the hands of the technical subject matter experts, and into the hands of the business sponsors. Therefore, in this paper, we propose combining Case-Based Reasoning (CBR) with RBR to assist business sponsors in making strategic decisions between public, private and hybrid cloud with a high level of confidence even at the initial stages of the project.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ac</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ac</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/06b856bf-2ab7-4646-8048-00e5b7515112.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Neda</given_name><surname>Azizi</surname><affiliations><institution><institution_name>Griffith University</institution_name><institution_id type="ror">https://ror.org/02sc3r913</institution_id><institution_department>School of Information and Communications Technology (ICT)</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Bruce</given_name><surname>Rowlands</surname><affiliations><institution><institution_name>Griffith University</institution_name><institution_id type="ror">https://ror.org/02sc3r913</institution_id><institution_department>School of Information and Communications Technology (ICT)</institution_department></institution></affiliations></person_name></contributors><titles><title>Risk Management in IT Departments: a Process Perspective</title></titles><jats:abstract abstract-type="long"><jats:p>This research reports on a field based research investigation into the processes of implementing Risk Management (RM) schemes in IT departments from a sensemaking perspective. Participation and implementation of the framework is conceptualised as a process of organisational learning. The literature on RM, specifically implementation issues associated with RM schemes, is reviewed. This paper focuses on contextual and processual elements as well as the action of key players associated with implementation. This research also suggests a different approach to doing RM research — one that takes into account the interaction over time of learning, context, meaning, process, planning and action around the implementation of RM schemes. The findings will provide insight for theory and practice, detailing the organisational learning that are associated with RM frameworks under certain circumstances, and how these might be assessed and managed.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ad</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ad</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/310b1ba5-fd9a-4981-8f5a-0685f3bf1ed9.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Michael</given_name><surname>Könning</surname><affiliations><institution><institution_name>TU Dresden</institution_name><institution_id type="ror">https://ror.org/042aqky30</institution_id></institution></affiliations></person_name></contributors><titles><title>Conceptualizing the Effect of Cultural Distance on IT Outsourcing Success</title></titles><jats:abstract abstract-type="long"><jats:p>The relationship quality between client and vendor organizations is one of the most significant influence factors for IT outsourcing success. In this context, the degree of dissimilarity between cultural values of two or more organizations (“cultural distance”) can represent a considerable challenge for establishing and maintaining good-quality relationships. Still, research on cultural distance and its effects is scarce. This paper seeks to address this gap. Building on extant theory on culture and IT outsourcing, we develop a research model which we are currently evaluating. This is done by means of an exploratory, qualitative research design based on an in-depth single case study that analyzes three outsourcing configurations of a leading European media company. Their diversity allows for a detailed examination of cultural distance on the national, organizational, and team level. Given its highly relevant characteristics, we expect our research to yield valuable contributions for both theory and practice.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ae</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ae</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/f73a6d02-413f-404d-ba5c-41cd8d48c7f5.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Bhavya Peapully</given_name><surname>Shroff</surname><affiliations><institution><institution_name>Indian Institute of Management Bangalore</institution_name><institution_id type="ror">https://ror.org/02xxpjq61</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Rajendra K.</given_name><surname>Bandi</surname><affiliations><institution><institution_name>Indian Institute of Management Bangalore</institution_name><institution_id type="ror">https://ror.org/02xxpjq61</institution_id></institution></affiliations></person_name></contributors><titles><title>Impact of IT Multisourcing on vendor opportunistic behaviour - A research framework</title></titles><jats:abstract abstract-type="long"><jats:p>IT Multisourcing (ITM), the provision of IT services by multiple interdependent vendors to a single client, is widely prevalent now. ITM, in principle, is believed to mitigate both strategic and operational risks of IT outsourcing for client organizations. Yet there is limited research which systematically investigates the effects of ITM on different forms of risk. This paper develops a theoretical framework to understand the implications of ITM for the specific risk of vendor opportunistic behaviour, classified as a ‘strategic risk’ of outsourcing. The fundamental attributes of ITM are identified and mechanisms through which they influence vendor opportunistic behaviour are explained. The advantages and limitations of the framework are discussed, and future research directions are laid out.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.af</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.af</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/30935965-7cfb-476b-8e8b-c537fa317300.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>João</given_name><surname>Barata</surname><affiliations><institution><institution_name>University of Coimbra</institution_name><institution_id type="ror">https://ror.org/04z8k9a98</institution_id><institution_department>Department of Informatics Engineering; ESTGOH</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Paulo Rupino</given_name><surname>da Cunha</surname><affiliations><institution><institution_name>University of Coimbra</institution_name><institution_id type="ror">https://ror.org/04z8k9a98</institution_id><institution_department>Department of Informatics Engineering</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sharon</given_name><surname>Coyle</surname><affiliations><institution><institution_name>University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Business Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Guidelines for Using Pilot Projects in the Fourth Industrial Revolution</title></titles><jats:abstract abstract-type="long"><jats:p>Pilot projects are popular in companies for experimenting with industry 4.0 concepts. However, few studies have addressed the specificities of piloting transformation, whose requirements are quite different than those for implementing a project with clear goals. Pilot projects can be used for the purpose of exploring, demonstrating, optimizing and disseminating solutions. In this paper we identify the role of pilot projects in digital transformation and define a successful pilot project so that it transcends to a full project. We provide accessible guidelines for the deployment of pilot projects in industry 4.0, drawing from a structured literature review and from lessons learned in an action research project implementing mixed reality in household ceramics production. A sound approach to pilot projects is important to reduce unknowns and risks in ensuing full projects and to contributing to organizational knowledge, offering an opportunity to rethink business strategies and train employees in digital transformation.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ag</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ag</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/c86bd8c8-f048-4fec-8bef-487fb43f59f9.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Maryamalsadat</given_name><surname>Shamekhi</surname><affiliations><institution><institution_name>Swinburne University of Technology</institution_name><institution_id type="ror">https://ror.org/031rekg67</institution_id><institution_department>Faculty of Business and Law</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Helana</given_name><surname>Scheepers</surname><affiliations><institution><institution_name>Swinburne University of Technology</institution_name><institution_id type="ror">https://ror.org/031rekg67</institution_id><institution_department>Faculty of Business and Law</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ashir</given_name><surname>Ahmed</surname><affiliations><institution><institution_name>Swinburne University of Technology</institution_name><institution_id type="ror">https://ror.org/031rekg67</institution_id><institution_department>Faculty of Health, Arts and Design</institution_department></institution></affiliations></person_name></contributors><titles><title>The impact of Business Analytics on organisations: An Information Processing Theory perspective</title></titles><jats:abstract abstract-type="long"><jats:p>Over the last few years, the number of organisations adopting business analytics (BA) has grown rapidly. Organisations adopt BA to gain better insights on their processes and structures that help them to make more informed business decisions. There are several studies that investigate how BA systems can improve decision-making, create competitive advantage and provide value. Mostly, the focus of these studies have been on the technical aspects of BA and its implementation in areas such as supply chain management, marketing, and finance. However, there is a lack of significant body of literature reporting on the impact of BA adoption on organisations. This study aims to develop a richer understanding of BA capabilities and organisational impact. Information processing theory (IPT) as a theoretical lens is used to investigate this phenomenon. This study will utilise an in-depth case study to provide rich explanations on the impact of BA adoption on organisations.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ah</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ah</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/d75f2edb-39fd-490a-888f-c730e3abe74e.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Shanlin</given_name><surname>Chang</surname><affiliations><institution><institution_name>National Sun Yat-sen University</institution_name><institution_department>Department of Information Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>San-Yih</given_name><surname>Hwang</surname><affiliations><institution><institution_name>National Sun Yat-sen University</institution_name><institution_department>Department of Information Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Yu-Chen</given_name><surname>Yang</surname><affiliations><institution><institution_name>National Sun Yat-sen University</institution_name><institution_department>Department of Information Management</institution_department></institution></affiliations></person_name></contributors><titles><title>Constructing Cooking Ontology for Live Streams</title></titles><jats:abstract abstract-type="long"><jats:p>We build a cooking domain knowledge by using an ontology schema that reflects natural language processing and enhances ontology instances with semantic query. Our research helps audiences to better understand live streaming, especially when they just switch to a show. The practical contribution of our research is to use cooking ontology, so we may map clips of cooking live stream video and instructions of recipes. The architecture of our study presents three sections: ontology construction, ontology enhancement, and mapping cooking video to cooking ontology. Also, our preliminary evaluations consist of three hierarchies—nodes, ordered-pairs, and 3-tuples—that we use to referee (1) ontology enhancement performance for our first experiment evaluation and (2) the accuracy ratio of mapping between video clips and cooking ontology for our second experiment evaluation. Our results indicate that ontology enhancement is effective and heightens accuracy ratios on matching pairs with cooking ontology and video clips.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ai</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ai</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/04023ba6-06ae-41e0-b5c4-453c6bf9e89a.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Dai Hoang</given_name><surname>Tran</surname><affiliations><institution><institution_name>Macquarie University</institution_name><institution_id type="ror">https://ror.org/01sf06y89</institution_id><institution_department>Department of Computing</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Zawar</given_name><surname>Hussain</surname><affiliations><institution><institution_name>Macquarie University</institution_name><institution_id type="ror">https://ror.org/01sf06y89</institution_id><institution_department>Department of Computing</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Wei Emma</given_name><surname>Zhang</surname><affiliations><institution><institution_name>Macquarie University</institution_name><institution_id type="ror">https://ror.org/01sf06y89</institution_id><institution_department>Department of Computing</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Nguyen Lu Dang</given_name><surname>Khoa</surname><affiliations><institution><institution_name>CSIRO Data61</institution_name></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Nguyen H.</given_name><surname>Tran</surname><affiliations><institution><institution_name>The University of Sydney</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>School of Information Technologies</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Quan Z.</given_name><surname>Sheng</surname><affiliations><institution><institution_name>Macquarie University</institution_name><institution_id type="ror">https://ror.org/01sf06y89</institution_id><institution_department>Department of Computing</institution_department></institution></affiliations></person_name></contributors><titles><title>Deep Autoencoder for Recommender Systems: Parameter Influence Analysis</title></titles><jats:abstract abstract-type="long"><jats:p>Recommender systems have recently attracted many researchers in the deep learning community. The state-of-the-art deep neural network models used in recommender systems are multilayer perceptron and deep autoencoder (DAE). In this work, we focus on DAE model due to its superior capability to reconstruct the inputs, which works well for recommender systems. Existing works have similar implementations of DAE but the parameter settings are vastly different for similar datasets. In this work, we have built a flexible DAE model, named FlexEncoder that uses configurable parameters and unique features to analyse the parameter influences on the prediction accuracy of recommender systems. Extensive evaluation on the MovieLens datasets are conducted, which drives our conclusions on the influences of DAE parameters. We find that DAE parameters strongly affect the prediction accuracy of the recommender systems, and the effect remains valid for similar datasets in a larger.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.aj</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.aj</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/c0e8c7f9-8770-417d-a50a-6cd7e129e5ae.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Stefan</given_name><surname>Cronholm</surname><affiliations><institution><institution_name>University of Borås</institution_name><institution_id type="ror">https://ror.org/01fdxwh83</institution_id><institution_department>School of Business and IT</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Hannes</given_name><surname>Göbel</surname><affiliations><institution><institution_name>University of Borås</institution_name><institution_id type="ror">https://ror.org/01fdxwh83</institution_id><institution_department>School of Business and IT</institution_department></institution></affiliations></person_name></contributors><titles><title>Guidelines Supporting the Formulation of Design Principles</title></titles><jats:abstract abstract-type="long"><jats:p>Design principles represent design knowledge and constitute a prescriptive component that is included in design theory. In design science research, the formulation of generalised and intelligible design principles that can be reused in new contexts is regarded as an important outcome. Our study has revealed that existing design principles vary in terms of structure, content, and level of abstraction. This variation and inconsistency may obstruct the reusability of the design principles. The purpose of this study is to suggest support for the formulation of design principles. In order to enhance the support for the formulation of design principles, we have suggested three guidelines, which are based on analyses of theoretical statements, existing guidelines, and existing design principles. The guidelines are illustrated by using material from a design science research project.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ak</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ak</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/082471ce-7e69-4acb-b7ae-8ad442876a1d.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Anne</given_name><surname>Faber</surname><affiliations><institution><institution_name>Technical University of Munich</institution_name><institution_id type="ror">https://ror.org/02kkvpp62</institution_id><institution_department>Department of Informatics</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Adrian</given_name><surname>Hernandez-Mendez</surname><affiliations><institution><institution_name>Technical University of Munich</institution_name><institution_id type="ror">https://ror.org/02kkvpp62</institution_id><institution_department>Department of Informatics</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sven-Volker</given_name><surname>Rehm</surname><affiliations><institution><institution_name>Université de Strasbourg</institution_name><institution_id type="ror">https://ror.org/00pg6eq24</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Florian</given_name><surname>Matthes</surname><affiliations><institution><institution_name>Technical University of Munich</institution_name><institution_id type="ror">https://ror.org/02kkvpp62</institution_id><institution_department>Department of Informatics</institution_department></institution></affiliations></person_name></contributors><titles><title>Visualizing Business Ecosystems: Applying a Collaborative Modelling Process in Two Case Studies</title></titles><jats:abstract abstract-type="long"><jats:p>Business ecosystems are increasingly gaining relevance in research and practice. Because business ecosystems progressively change, enterprises are interested in analysing their ecosystem, to identify and address such changes. In order to gain a comprehensive picture of the business ecosystem, various stakeholders of the enterprise should be involved in the analysis process. We propose a collaborative approach to model and visualize the business ecosystem and we validate four central roles in the modelling process. The process consists of six steps, namely the definition of the business ecosystem focus, instantiation of the model, data collection, provision of tailored visualizations, collecting feedback and adapting the models, and using the visualization ‘to tell a story’. In this paper, we report case studies of two companies that have instantiated ecosystem models.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.al</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.al</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/b2ec9f02-aa40-473c-99ad-3307a282091e.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Ngoc Tuan</given_name><surname>Chau</surname><affiliations><institution><institution_name>School of Business IT &amp; Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Hepu</given_name><surname>Deng</surname><affiliations><institution><institution_name>School of Business IT &amp; Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name></contributors><titles><title>Critical Determinants for Mobile Commerce Adoption in Vietnamese SMEs: A Preliminary Study</title></titles><jats:abstract abstract-type="long"><jats:p>The critical determinants for e-commerce, e-business, and other enterprise information systems adoption in SMEs have been well-documented. The critical determinants for m-commerce adoption in SMEs, however, are still limited, especially in SMEs in developing countries. This paper develops a measurement instrument for investigating the critical determinants of m-commerce adoption in Vietnamese SMEs. A preliminary study is conducted for confirming the reliability and validity of the instrument based on the data collected from 172 managers of Vietnamese SMEs using an online survey. The Cronbach’s alpha and the composite reliability values of the proposed variables strongly support their reliability. The results of the exploratory factor analysis confirm constructs’ discriminant validity. The average variance extracted values confirm constructs’ convergent validity. This study contributes to the identification of the critical determinants for m-commerce adoption in SMEs. It provides a new conceptual framework for assessing the critical determinants for m-commerce adoption in SMEs in developing countries.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.am</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.am</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/1ab1f2eb-0f63-42c3-8165-2495e83825b4.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Neeraj</given_name><surname>Sahu</surname><affiliations><institution><institution_name>School of Business Information Technology and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Hepu</given_name><surname>Deng</surname><affiliations><institution><institution_name>School of Business Information Technology and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Alemayehu</given_name><surname>Molla</surname><affiliations><institution><institution_name>School of Business Information Technology and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name></contributors><titles><title>A capability based framework for customer experience focused digital transformation</title></titles><jats:abstract abstract-type="long"><jats:p>Digital transformation has a potential to deliver numerous values for an organisation through transforming its business models, organisational processes, products and services, and customer engagement. Such a transformation assists organisations to create new capabilities to better serve customers, leading to the improvement of customer experience. As a result, numerous organisations have been investing in digital transformation in today’s dynamic environment. There is however, lack of a comprehensive framework for facilitating the implementation of digital transformation in organisations towards improving customer experience. This paper develops a capability based framework for digital transformation in organisations with respect to improving customer experience. Such a framework consisting of analytics, business, customer, and digital is developed through a thematic analysis of qualitative data collected from digital transformation experts in an organization in Australia using semi-structured interviews. The paper contributes to digital transformation research by the development of a capability framework for better understanding digital transformation in organisations related to the improvement of customer experience.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.an</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.an</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/5092aa93-d186-41ab-8d34-8acc93ebe11e.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Richard</given_name><surname>Hagl</surname><affiliations><institution><institution_name>Waterford Institute of Technology (WIT)</institution_name><institution_department>The Department of Graduate Business</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Aidan</given_name><surname>Duane</surname><affiliations><institution><institution_name>Waterford Institute of Technology (WIT)</institution_name><institution_department>The Department of Graduate Business</institution_department></institution></affiliations></person_name></contributors><titles><title>Exploring the Impact of Augmented Reality and Virtual Reality Technologies on Business Model Innovation in Technology Companies in Germany</title></titles><jats:abstract abstract-type="long"><jats:p>Newly-emerging, digitally-based technological innovations, such as augmented reality (AR) and virtual reality (VR), are new drivers for business model innovation. This study aims to develop a better understanding of the impact of AR/VR technologies on business model innovation in technology companies. The objective of the study is “to explore the impact of augmented reality and virtual reality technologies on business model innovation in technology companies in Germany”. This paper investigates the body of knowledge regarding contemporary business model innovation and presents a conceptual framework to guide the research. The philosophical underpinnings of the study are discussed, and the chosen research methodology is justified. A holistic multiple-case study design targets German business-to-business technology companies employing AR/VR technologies to innovate their business models. The paper concludes with a discussion of initial learnings garnered from the implementation of a pre-pilot case study test run, and a full pilot case study.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ao</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ao</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/fefb7888-9281-4241-9594-4224e21857a6.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Janne J.</given_name><surname>Korhonen</surname><affiliations><institution><institution_name>Aalto University</institution_name><institution_id type="ror">https://ror.org/020hwjq30</institution_id><institution_department>School of Science</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Asif Q.</given_name><surname>Gill</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Software</institution_department></institution></affiliations></person_name></contributors><titles><title>Digital Capability Dissected</title></titles><jats:abstract abstract-type="long"><jats:p>There is a growing interest in digital innovation and transformation among the researchers and practitioners. It has been recognised that being “digital” is not all about digital data and information technologies. The notion of “digital capability” has been increasingly embraced, but definitions of this concept have remained vague and elusive. A salient research question remains: what is digital capability? This question is explored in this paper from theoretical and practical perspectives in the form of a conceptual construct: the Digital Capability Framework (D-CaF). The framework distinguishes six levels and seven dimensions of digital capability. It is intended to provide a foundation to plan and execute digital capability driven innovation and transformation initiatives. Further, it helps identify and prioritise the research areas of high impact for further studies.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ap</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ap</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/2d99b782-12a0-4af7-82d5-f53aaa3f1b15.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Thamer</given_name><surname>Alshammari</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>Faculty of Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Yen</given_name><surname>Cheung</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>Faculty of Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Chris</given_name><surname>Messom</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>Faculty of Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>M-government Adoption Research Trends: A Systematic Review</title></titles><jats:abstract abstract-type="long"><jats:p>Mobile government (m-government) adoption is a relatively new area in the field of information systems which has only started to attract research attention in the last few years. This paper presents a systematic review of m-government adoption to investigate its current and future research directions. This paper reviews 30 studies that were published in scientific journals and conferences during the last five years on the topic of m-government. It analyzes the research in terms of research methodology, theories used, stakeholders, limitations and recommendations. Results of this paper indicate that the quantitative approach is the most commonly used methodology and the Technology Acceptance Model is the most prevalent theory used in m-government research. A majority of reported limitations of the published research are related to samples and generalizability. Following an analysis of the results, more focus on stakeholders’ roles in m-government adoption is suggested and this is believed to be a significant agenda for future research in this area.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.aq</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.aq</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/0d5a2773-f158-4401-85eb-a944a2a9d7b9.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Ashish Kumar</given_name><surname>Jha</surname><affiliations><institution><institution_name>Rennes School of Business</institution_name><institution_id type="ror">https://ror.org/02f08fz18</institution_id><institution_department>Supply Chain and IS Department</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Indranil</given_name><surname>Bose</surname><affiliations><institution><institution_name>Indian Institute of Management Calcutta</institution_name><institution_id type="ror">https://ror.org/02zhewk16</institution_id><institution_department>Management Information Systems Department</institution_department></institution></affiliations></person_name></contributors><titles><title>Supplying Innovation?: Investigating Impact of Suppliers on Innovation in IT Firms</title></titles><jats:abstract abstract-type="long"><jats:p>Although IT has been widely recognized as one of the most important determinants of the innovation in firms yet the determinants of innovation within IT firms are very poorly understood. Higher cooperation with various players is widely believed to be an important determinant of innovation productivity. The players include suppliers, clients, competitors, universities etc. Amongst these supplier is a very intriguing class of partners more so because of its importance for manufacturing firms and almost a negligible presence in IT literature. We attempt to understand what impact a closer cooperation with suppliers has in innovation productivity in IT firms. Literature from traditional manufacturing firms’ domain indicates that suppliers are very integral to innovation processes at a firm. Our research drawing from data of Chinese firms finds that suppliers are indeed a very critical determinant of IT innovation as well. The results from this paper sheds considerable light on suppliers and their integral role for IT firms’ innovation development.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ar</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ar</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/5c723e3f-675a-4efe-a75b-230d07652b81.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Ravi</given_name><surname>Seethamraju</surname><affiliations><institution><institution_name>University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Krishna Sundar</given_name><surname>Diatha</surname><affiliations><institution><institution_name>Indian Institute of Management Bangalore</institution_name><institution_id type="ror">https://ror.org/02xxpjq61</institution_id></institution></affiliations></person_name></contributors><titles><title>Adoption of Digital Payments by Small Retail Stores</title></titles><jats:abstract abstract-type="long"><jats:p>Entry of large supermarkets and online retailers, and widespread adoption of digital technologies are threatening the business models of small retail convenient stores in India. Using a qualitative methodology and the Technology-Organization-Environment framework, this study, investigated the challenges faced by these small retail stores in the context of a deliberate governmental push towards digital payments and increasing competition from large supermarkets and online retailers. Perceived loss of control, costs of technologies, customer’s low socio-economic background, suppliers influence, tax and security implications, bureaucracy, and lack of trust in the regulatory and external environment are the challenges identified in the study. In addition, poor physical and digital infrastructure, inadequate access to and poor reliability of digital technologies, and the costs are constraining the adoption of digital technologies.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.as</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.as</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/6829a7b7-6517-4b68-87af-6345101a8cd5.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Laiza L.</given_name><surname>Limpin</surname><affiliations><institution><institution_name>De La Salle University – Manila</institution_name><institution_id type="ror">https://ror.org/02beve479</institution_id><institution_department>College of Computer Studies</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Raymund C.</given_name><surname>Sison</surname><affiliations><institution><institution_name>De La Salle University – Manila</institution_name><institution_id type="ror">https://ror.org/02beve479</institution_id><institution_department>College of Computer Studies</institution_department></institution></affiliations></person_name></contributors><titles><title>Drivers’ Tactics in Ridesharing Economy in the Philippines</title></titles><jats:abstract abstract-type="long"><jats:p>Increasing mobility needs, coupled with the lack of adequate public transportation has led to the popularity of ridesharing services in the Philippines, which in 2015 became the first country to implement a regulatory framework for ridesharing through transportation network company (TNC) apps. This study aims to explore the participation of drivers in the ridesharing economy in Metro Manila. Employing thematic analysis, the driver tactics are viewed as falling under one of six categories: surge chasing, request skipping, dual driving, colorum, operator tactics and focusing. While many of the themes confirm the findings of earlier studies, some ridesharing tactics found in the Philippine context provide nuances that may offer insights on the drivers’ use of ridesharing platforms. Specifically, these strategies suggest that users find new ways to use the technology to support their motivations, resulting in a notion deviant to the original purpose of ridesharing.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.at</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.at</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/bdb16db3-ec47-47da-870a-b79db49b2fc4.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Maria Veronica</given_name><surname>Torres Pena</surname><affiliations><institution><institution_name>The University of Melbourne</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>School of Computing and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Christoph F.</given_name><surname>Breidbach</surname><affiliations><institution><institution_name>The University of Melbourne</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>School of Computing and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Andrew</given_name><surname>Turpin</surname><affiliations><institution><institution_name>The University of Melbourne</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>School of Computing and Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Self-organizing Service Ecosystems: Exploring a New Concept for Service Science</title></titles><jats:abstract abstract-type="long"><jats:p>The rapid advancements on digital technologies have positioned digital transformation as a central topic of interest to information systems (IS) researchers. However, our understanding of the nature, extent and dynamics of digital service ecosystems remains limited. This short paper contributes to IS and service science research by introducing the conceptualization of self-organizing service ecosystem as an analytical lens for understanding digital transformative phenomena in service ecosystems. To achieve this, we draw on the most recent narrative of value co-creation from service-dominant logic and on key definitions from the theory of self-organization. This paper also discusses future research directions emphasizing on the role and impact of technology in self-organizing service ecosystems.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.au</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.au</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/805bac78-17bd-4ee9-ac64-a075d491a2b3.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Khalid</given_name><surname>Alshammari</surname><affiliations><institution><institution_name>School of Business Information Technology and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Arthur</given_name><surname>Adamopoulos</surname><affiliations><institution><institution_name>School of Business Information Technology and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Martin</given_name><surname>Dick</surname><affiliations><institution><institution_name>School of Business Information Technology and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name></contributors><titles><title>Organisational Transformation as a Consequence of Software-as-a-Service Usage by Small and Medium Enterprises</title></titles><jats:abstract abstract-type="long"><jats:p>Cloud computing, and particularly Software-as-a-Service, is now in widespread use, but how organisations are potentially transformed by Software-as-a-Service usage needs greater understanding. How do organisations, particularly Small and Medium Enterprises, change their processes and structures after a period of time of using Software-as-a-Service solutions? This study used a qualitative method of investigation. Sixteen semi-structured interviews have been conducted with participants from eleven different organisations. It was found that all the organisations experienced transformation to some extent. The types of organisational transformation observed included changes to organisational processes, changes to the structures within the organisations and also changes to the role played by IT departments. Relationships between these forms of transformation were also found. A greater understanding of these transformations can help organisations gain greater benefits from Software-as-a-Service solutions.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.av</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.av</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/d2a8be28-f1d8-4fd9-aa44-2b0257cc7891.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Prasanna</given_name><surname>Balasooriya L.N.</surname><affiliations><institution><institution_name>Central Queensland University</institution_name><institution_id type="ror">https://ror.org/023q4bk22</institution_id><institution_department>School of Engineering and Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>A Confirmatory Investigation of the Factors Influencing the Cloud Adoption in Local Government Organisations in Australia</title></titles><jats:abstract abstract-type="long"><jats:p>The purpose of this paper is to discuss major factors of two well-known theoretical frameworks namely Technology-Organization-Environment (TOE) and Technology Acceptance Model (TAM), and examine how those factors could influence the Organizational decision on Cloud technology adoption. The research underlining was carried out using quantitative research methodology based on a survey questionnaire distributed to IT professionals across Australia. The survey questionnaire was developed based on 12 hypotheses and 24 indicator variables. Around 200 responses were analysed by using two-tier approach (a) confirmatory factor analysis to confirm the reliability and validity of the latent variables, and (b) analysis of the structural model to confirm or reject the hypothesis. The final analysis of the results has revealed that only 8 hypotheses are significant and can be adopted. Furthermore, results have revealed that 4 hypotheses have a non-significant impact on the proposed framework and can be rejected from the framework.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.aw</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.aw</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/885da670-a19d-4f8f-b097-bec75d240632.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Ahmad</given_name><surname>Ghazawneh</surname><affiliations><institution><institution_name>Halmstad University</institution_name><institution_id type="ror">https://ror.org/03h0qfp10</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Osama</given_name><surname>Mansour</surname><affiliations><institution><institution_name>Jönköping University</institution_name><institution_id type="ror">https://ror.org/03t54am93</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Magnus</given_name><surname>Bergquist</surname><affiliations><institution><institution_name>Halmstad University</institution_name><institution_id type="ror">https://ror.org/03h0qfp10</institution_id></institution></affiliations></person_name></contributors><titles><title>Strategizing in Digital Application Marketplaces</title></titles><jats:abstract abstract-type="long"><jats:p>Digital application marketplaces have become an important strategizing device for many product developing firms. However, creating and sustaining digital application marketplaces are challenging tasks and only little empirical evidence exists about the role and nature of strategy for these marketplaces and how such strategizing actually unfolds in practice. Drawing on a case study of Apple’s App Store, we applied a strategy-as-process perspective to investigate the role of a digital application marketplace in the development of a digital platform. Our analysis identifies and describes three different strategies in the App Store case: monetizing, governing and enhancing, and demonstrates how they were enacted proactively or reactively to support the development of the platform.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ax</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ax</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/6111212f-4e23-4bd0-bfb7-af8b8c579f36.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Erwin</given_name><surname>Fielt</surname><affiliations><institution><institution_name>Queensland University of Technology</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Peter</given_name><surname>Westerveld</surname><affiliations><institution><institution_name>Queensland University of Technology</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kevin</given_name><surname>Desouza</surname><affiliations><institution><institution_name>Queensland University of Technology</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Guy</given_name><surname>Gable</surname><affiliations><institution><institution_name>Queensland University of Technology</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id></institution></affiliations></person_name></contributors><titles><title>Business model innovation and strategic transformation when confronting digital disruption: The case of data-driven business models for professional services</title></titles><jats:abstract abstract-type="long"><jats:p>Most businesses and industries are undergoing significant disruption due to digital innovation. We focus our discussion on the rise of data-driven business models in the professional services industry. Big data, advanced analytics and artificial intelligence solutions are now diffusing across industries. Professional services firms are knowledge-intensive which may raise specific issues in relation to data analytics and artificial intelligence. In addition, these firms currently face high levels of potential disruption due to digital innovation by new start-ups. When trying to understand the impact of these developments on the professional services industry, two prominent issues need to be considered. Firstly, digital innovation often results in the creation of new business models. This raises questions about whether these models are more generic (digital), showing great similarities across industries, or specific to the professional services industry. Moreover, there are questions related to whether the initiators of business model innovation are new, digital start-ups, or well-established incumbents. Secondly, when an incumbent is required to transform due to digital disruption, we need a more nuanced understanding of the strategic transformation processes in relation to the nature of professional services and technology innovation. Our paper makes two major contributions to the literature. First, it takes a critical look at data-driven business models in the context of professional services firms. Second, it puts forth several research propositions that warrant further critical examination when it comes digital disruption barriers and enablers faced by incumbents and start-ups.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ay</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ay</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/ce06ed18-5771-468b-aabf-c756063aebef.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Henrik C. J</given_name><surname>Linderoth</surname><affiliations><institution><institution_name>Jönköping University</institution_name><institution_id type="ror">https://ror.org/03t54am93</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mattias</given_name><surname>Jacobsson</surname><affiliations><institution><institution_name>Jönköping University</institution_name><institution_id type="ror">https://ror.org/03t54am93</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Amany</given_name><surname>Elbanna</surname><affiliations><institution><institution_name>Royal Holloway University of London</institution_name><institution_id type="ror">https://ror.org/04g2vpn86</institution_id></institution></affiliations></person_name></contributors><titles><title>Barriers for Digital Transformation: The Role of Industry</title></titles><jats:abstract abstract-type="long"><jats:p>Limited attention has been paid to why certain industries, like the AEC (Architectural, Engineering and Construction), is lagging behind in digital transformation. The question can be raised if there are characteristics on industry level that constrain digital transformation? The aim of the paper is to explore how the interactions among four industry key actors; architects, clients, contractors and consultants shape industry characteristics and the options for digital transformation through adoption and use of digital technology. The aim will be achieved through a combination of individual- and focus group interviews with representatives of the key actor groups focused on how they perceive Building Information Modelling (BIM). It is concluded that the characteristics of the industry; the focus on practical day-to-day action, a heterogeneous client side who have difficulties in putting demands on contractors and sub-contractors due to lack of competencies, and a product that raise barriers for process innovations do effectively constrain digital transformation.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.az</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.az</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/efc779bd-8f29-4d81-b2ed-76d4d8cc3f31.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Ziqi</given_name><surname>Liao</surname><affiliations><institution><institution_name>Hong Kong Baptist University</institution_name><institution_id type="ror">https://ror.org/0145fw131</institution_id><institution_department>School of Business</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Xinping</given_name><surname>Shi</surname><affiliations><institution><institution_name>Hong Kong Baptist University</institution_name><institution_id type="ror">https://ror.org/0145fw131</institution_id><institution_department>School of Business</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Man Hei</given_name><surname>Yee</surname><affiliations><institution><institution_name>Hong Kong Baptist University</institution_name><institution_id type="ror">https://ror.org/0145fw131</institution_id><institution_department>School of Business</institution_department></institution></affiliations></person_name></contributors><titles><title>Key Determinants of Enterprise E-banking Assimilation</title></titles><jats:abstract abstract-type="long"><jats:p>This paper empirically examines key determinants of enterprise e-banking assimilation. The analytical results unveil that utilitarian value and usability positively affect trustworthiness and satisfaction of enterprise e-banking services. In particular, firms’ satisfaction possesses a significant mediating effect on continuance intention to use enterprise e-banking services in business operations. The present study makes contributes to research and practice. The empirical findings enrich the understanding of enterprise e-banking assimilation and have managerial implications for the development of enterprise e-banking systems and services.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ba</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ba</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/490bf7ab-ec87-441a-baea-362c9fda4ed7.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Memoona J.</given_name><surname>Anwar</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Asif Q.</given_name><surname>Gill</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ghassan</given_name><surname>Beydoun</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>A review of information privacy laws and standards for secure digital ecosystems</title></titles><jats:abstract abstract-type="long"><jats:p>Information privacy is mainly concerned with the protection of personally identifiable information. Information privacy is an arduous task, in particular, in the context of complex adaptive and multi-party heterogeneous digital ecosystems. There is a need to identify and understand the relevant privacy laws and standards for designing the secure digital ecosystems. This paper presents the results of our information privacy research in digital ecosystems through the lens of local and international privacy regulations and standards. A qualitative research method was applied to review a set of identified privacy laws across the four layers of digital ecosystem. The evaluation criteria has been applied to evaluate the applicability and coverage of the selected seven information privacy laws to people, process, information and technology layers of the digital ecosystems. The research results indicate that information privacy is a critical phenomenon; however, it is not adequately addressed in the context of end-to-end digital ecosystems. It is recommended that a multi-layered privacy by design approach is required by reviewing and mapping information privacy laws and standards to design the secure digital ecosystems.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bb</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bb</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/c5c54801-fc8f-415b-a9ea-75fb8aff2efd.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Tharaka</given_name><surname>de Vass</surname><affiliations><institution><institution_name>Victoria University</institution_name><institution_id type="ror">https://ror.org/01rrz9s51</institution_id><institution_department>College of Business</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Himanshu</given_name><surname>Shee</surname><affiliations><institution><institution_name>Victoria University</institution_name><institution_id type="ror">https://ror.org/01rrz9s51</institution_id><institution_department>College of Business</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Shah Jahan</given_name><surname>Miah</surname><affiliations><institution><institution_name>Victoria University</institution_name><institution_id type="ror">https://ror.org/01rrz9s51</institution_id><institution_department>College of Business</institution_department></institution></affiliations></person_name></contributors><titles><title>Internet of Things for improving Supply Chain Performance: A Qualitative Study of Australian Retailers</title></titles><jats:abstract abstract-type="long"><jats:p>Internet of Things (IoT) is a global platform of Internet connected smart devices that have been argued to improve the supply chain integration (SCI). While the positive effect of IoT capability on SCI influencing supply chain and firm performance is empirically validated, exploratory study in this context is limited. Drawing upon the organisational capability theory, this study investigates the use of IoT in enhancing the integration of suppliers, customers and internal activities of the retail supply chain. Interviews of managers across Australian retail industry were analysed using Nvivo. The thematic analysis reveals the added capability of IoT that improves supply chain visibility, auto-capture and information sharing for greater SCI. The IoT-enabled integration capability demonstrates a positive effect on cost, quality, delivery, and flexibility of the entire supply chain and improves retail firm’s sustainable performance with financial, social and environmental outcomes.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bc</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bc</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/a2d3d6a3-c109-4536-b345-a7bd5e9649c7.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Tim</given_name><surname>Hamelmann</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Andreas</given_name><surname>Drechsler</surname><affiliations><institution><institution_name>Victoria University of Wellington</institution_name><institution_id type="ror">https://ror.org/0040r6f76</institution_id><institution_department>School of Information Management</institution_department></institution></affiliations></person_name></contributors><titles><title>Impacts of Digital Natives on Technology Acceptance: A Conceptual Analysis</title></titles><jats:abstract abstract-type="long"><jats:p>We seek to identify the impacts Digital Natives (DN) – as the first generation that has grown up with new digital technologies such as the Internet from their childhood – have on technology acceptance (TA) by investigating the effect of DN’ specific traits, abilities, and experiences on TA factors and variables. We conduct two literature reviews: the first about TA factors and variables and the second about DN and generational differences. We find that some TA factors and variables that prior research has pointed out as significant are likely to change in importance: DN do not question the use of technology itself and may be at least partially familiar with it but simultaneously have higher demands for the quality and usefulness of technology. Researchers can draw on our findings to validate them empirically in the future or problematize the current state of TA research. Practitioners can apply our findings to develop information systems that DN find attractive to use.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bd</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bd</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/499e5aea-2153-4a3f-9bb8-2b5397553820.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Julian</given_name><surname>Marx</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Milad</given_name><surname>Mirbabaie</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Stefan</given_name><surname>Stieglitz</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name></contributors><titles><title>You are now an Influencer! Measuring CEO Reputation in Social Media</title></titles><jats:abstract abstract-type="long"><jats:p>We know that reputation in organisational contexts can be understood as a valuable asset that requires diligent management. It directly affects how a firm is publicly perceived, and indirectly, how a firm will perform economically. The establishment of social media as ubiquitous tools of communication have changed how corporations manage their reputation. Particularly CEOs face novel responsibilities, as they deal with their personal image, which at the same time affects the reputation of their firm. Whereas CEO and corporate reputation have been researched isolated from each other, little is known about how a CEO’s social media reputation management affects corporate reputation. This research in progress paper aims to emphasise this research gap with a literature review on the current status of reputation management and measurement by means of social media. We further propose a research design that combines sentiment analysis, frequency detection, and content analysis and discuss further research prospects.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.be</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.be</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/2a77be81-825e-4198-b91b-eee4bfc4d7eb.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Shankhadeep</given_name><surname>Banerjee</surname><affiliations><institution><institution_name>Indian Institute of Management Calcutta</institution_name><institution_id type="ror">https://ror.org/02zhewk16</institution_id><institution_department>Management Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Indranil</given_name><surname>Bose</surname><affiliations><institution><institution_name>Indian Institute of Management Calcutta</institution_name><institution_id type="ror">https://ror.org/02zhewk16</institution_id><institution_department>Management Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Risky Donation for Rewarding Innovation? Examining Transformation of Technology Consumers into Crowdfunding Patrons</title></titles><jats:abstract abstract-type="long"><jats:p>Reward-based crowdfunding platforms transform technophilic consumers into technology patrons by enabling them to donate for technology development in lieu of receiving the finished product as reward in future. Literature specifically on crowdfunding of technologies is tenuous, and researchers have not yet established the causal factors which entice technology consumers to donate. Using Elaboration Likelihood Model as theoretical base, we conduct a 2x2x2 mixed-design experiment to examine the effects of three core elements of crowdfunding (value of reward, waiting time to receive technology, and affective cues in donor appeal) on a potential consumer’s likelihood to donate. Our results show positive impact of reward, and negative impact of waiting time, but surprisingly no effect of affective cues. Significant interaction between reward and waiting time has also been observed. Apart from theoretical contributions, the findings have tactical implications for technology start-ups planning to raise funding through donations, and design implications for crowdfunding platforms.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bf</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bf</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/a26ce27b-a333-4244-9bf2-afb7f40402ac.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Mahdi</given_name><surname>Fahmideh</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Information, Systems and Modelling</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Thorsten</given_name><surname>Lammers</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Information, Systems and Modelling</institution_department></institution></affiliations></person_name></contributors><titles><title>A study of influential factors in designing self-reconfigurable robots for green manufacturing</title></titles><jats:abstract abstract-type="long"><jats:p>There is incremental growth in adopting self-reconfigurable robots in automating manufacturing conventional product lines. Using this class of robots adapting themselves with ever-changing environmental conditions has been acclaimed as a promising way of reducing energy consumption and environmental impact and thus enabling green manufacturing. Whilst the majority of existing research focuses on highlighting the efficacy of self-reconfigurable robots in energy reduction with technical driven solutions, the research on exploring the salient factors in design and development self-reconfigurable robots that directly enable or hinder green manufacturing is non-extant. This interdisciplinary research contributes to the nascent body of the knowledge by empirical investigation of design-time, run-time, and hardware aspects which should be contingently balanced when developing green-aware self-reconfigurable robots.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bg</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bg</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/47e0ec1a-f4a0-4bef-8168-7a8403e074dd.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Tri</given_name><surname>Lam</surname><affiliations><institution><institution_name>The University of Queensland</institution_name><institution_id type="ror">https://ror.org/00rqy9422</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jon</given_name><surname>Heales</surname><affiliations><institution><institution_name>The University of Queensland</institution_name><institution_id type="ror">https://ror.org/00rqy9422</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Nicole</given_name><surname>Hartley</surname><affiliations><institution><institution_name>The University of Queensland</institution_name><institution_id type="ror">https://ror.org/00rqy9422</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Chris</given_name><surname>Hodkinson</surname><affiliations><institution><institution_name>The University of Queensland</institution_name><institution_id type="ror">https://ror.org/00rqy9422</institution_id></institution></affiliations></person_name></contributors><titles><title>Information Transparency Matters in Relation to Consumer Trust in Food Safety</title></titles><jats:abstract abstract-type="long"><jats:p>The purpose of this article is to provide an integrative conceptual model and propositions to assist in understanding whether information transparency matters under the support of traceability systems and online social networking information in relation to consumer trust in food safety. Extant literature forms the foundation for this article. A conceptual model resulting from this proposes that information on food products provided by traceability systems is proposed to stimulate consumers’ perceived knowledge of food products. Furthermore, online social networking information advances consumer trust in food product safety. The conceptual model proposes three testable propositions and provides insights into food information that consumers find useful for developing trust in food products.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bh</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bh</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/f5bc371c-7ccd-4b4d-a1ec-8079c54f06d1.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Alvedi</given_name><surname>Sabani</surname><affiliations><institution><institution_name>School of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Hepu</given_name><surname>Deng</surname><affiliations><institution><institution_name>School of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Vinh</given_name><surname>Thai</surname><affiliations><institution><institution_name>School of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name></contributors><titles><title>A Conceptual Framework for the Adoption of E-Government in Indonesia</title></titles><jats:abstract abstract-type="long"><jats:p>The rapid development of e-government across the world has opened the discussion on how governments can improve citizens’ adoption of their online public services. As a result, the adoption of e-government has become a fundamental issue that needs to be adequately addressed. This paper presents a conceptual framework for examining the adoption of e-government from the perspective of citizens. Through semi-structured interviews conducted in Indonesia, the conceptual framework was validated using thematic analysis, which indicates that performance expectancy, effort expectancy and social influence are interrelated critical factors for the adoption of e-government. In terms of academic contribution, this research provides a better understanding of the critical factors for the adoption of e-government from the perspective of citizens. With regards to practical implications, this research provides the Indonesian government and public organisations with relevant suggestions on how the adoption of e-government can be improved.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bi</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bi</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/b964d202-f8d3-40ed-8e6d-395cf9b52352.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Thi Thu Huong</given_name><surname>Nguyen</surname><affiliations><institution><institution_name>Queensland University of Technology</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id><institution_department>School of Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mustafa</given_name><surname>Hashmi</surname><affiliations><institution><institution_name>Federation University (FedUni)</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mary</given_name><surname>Tate</surname><affiliations><institution><institution_name>Victoria University of Wellington</institution_name><institution_id type="ror">https://ror.org/0040r6f76</institution_id><institution_department>School of Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Towards a High-level Service Delivery Architecture for One-Stop Government (OSG)</title></titles><jats:abstract abstract-type="long"><jats:p>The work on the service delivery in the context of one-shop government architecure is far from being mature. Although the understanding on various levels of complexity of e-government service delivery has been addressed, many extant versions of the service delivery architectures themselves are dated and do not reflect the potential contribution of new technologies. In this work-in-progress paper, we report ongoing work and propose an updated service delivery architecutre comprising five distinct layers. The proposed architecture addresses some important challenges, and suggests areas for future research as outlined in the paper.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bj</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bj</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/de0ac8cf-f013-404a-884a-8d26c47950a0.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Mazino</given_name><surname>Amuno</surname><affiliations><institution><institution_name>University of Tasmania</institution_name><institution_id type="ror">https://ror.org/01nfmeh72</institution_id><institution_department>School of Technology, Engineering &amp; Design</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mohammad Sadegh</given_name><surname>Taskhiri</surname><affiliations><institution><institution_name>University of Tasmania</institution_name><institution_id type="ror">https://ror.org/01nfmeh72</institution_id><institution_department>School of Technology, Engineering &amp; Design</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Paul</given_name><surname>Turner</surname><affiliations><institution><institution_name>University of Tasmania</institution_name><institution_id type="ror">https://ror.org/01nfmeh72</institution_id><institution_department>School of Technology, Engineering &amp; Design</institution_department></institution></affiliations></person_name></contributors><titles><title>Mitigating traceability risks amongst SMEs along the beef supply chain: A multiple case study approach to investigating the role and potential impact of information technology</title></titles><jats:abstract abstract-type="long"><jats:p>This research-in-progress investigates how information technology can be used to mitigate increasing traceability risks being faced by small and medium sized enterprises (SMEs) along beef industry supply chains. Changing consumer preferences for information on product provenance as well as enhanced food safety requirements have increased the need for businesses to improve their traceability. Unfortunately, most traceability system are designed for large organisations in well-integrated supply chains. For SMEs in fragmented food chains finding ways to respond has proven difficult. Deploying a heuristic traceability framework, the research has used a multiple case study approach that has involved the development, implementation and current on-going evaluation of some low-cost IT traceability tools in 5 different beef supply chain segments involving SMEs. Preliminary results provide new perspectives on the role and potential impact of low cost IT for mitigating risks amongst SMEs in beef chains and for further refining the heuristic traceability framework for SMEs.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bk</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bk</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/ee1b9eff-1b2c-40fd-9861-66cac7334ecc.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Blair</given_name><surname>Wang</surname><affiliations><institution><institution_name>UNSW Business School</institution_name></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Daniel</given_name><surname>Schlagwein</surname><affiliations><institution><institution_name>The University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Dubravka</given_name><surname>Cecez-Kecmanovic</surname><affiliations><institution><institution_name>UNSW Business School</institution_name></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Michael C.</given_name><surname>Cahalane</surname><affiliations><institution><institution_name>UNSW Business School</institution_name></institution></affiliations></person_name></contributors><titles><title>Digital Work and High-Tech Wanderers: Three Theoretical Framings and a Research Agenda for Digital Nomadism</title></titles><jats:abstract abstract-type="long"><jats:p>This paper presents a literature review and conceptual development of digital nomadism. Digital nomadism is characterised by mobile workers indefinitely travelling between different locations while continually fulfilling their work obligations. The emerging literature on digital nomadism is fragmented and primarily focused on digital nomads’ lifestyles. There is comparatively less focus on theoretically framing digital nomadism into broader narratives in human history. In order to gain a holistic understanding, this paper reviews the limited literature on digital nomadism and expands to other relevant literatures on economy (e.g. traditional boundaries in business), culture (e.g. lifehacking), and technology (e.g. telework and digital communication). These three theoretical framings of digital nomadism enable this paper to identify the current state of knowledge relevant to digital nomadism and develop a research agenda.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bl</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bl</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/e34d20b4-6096-455c-90a6-e5e8882f8d4d.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Reihaneh</given_name><surname>Bidar</surname><affiliations><institution><institution_name>Queensland University of Technology</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id><institution_department>School of Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Customer Value Perception toward Use of Mobile Banking Applications</title></titles><jats:abstract abstract-type="long"><jats:p>Mobile banking (m-banking) is one of the most widely used applications and innovative banking services in the past decade. However, the adoption rate of m-banking in developing countries is low and still has potential for growth. We explored factors and value perceptions of clients toward the use of m-banking applications. A conceptual model is presented using the Technology Acceptance Model (TAM) and Uses and Gratification Theory (UGT). The tested variables are Perceived Usefulness, Perceived Ease of Use, Social Integrative, Personal Integrative and Hedonic Benefits. 278 valid survey responses were collected from Iranian and Turkish clients. Multiple regression analysis indicated that Perceived Usefulness and Social Integrative Benefit are the key drivers in both Iran and Turkey, but Hedonic Benefit is only significant in Iran. The results contribute to literature by integrating UGT and TAM and to participate as it enables banks to better design services and to improve customer experience.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bm</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bm</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/46f66c83-b39f-47c2-8fa6-50e28978cf73.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Mehdi</given_name><surname>Asgarkhani</surname><affiliations><institution><institution_name>Ara Institute of Canterbury</institution_name><institution_id type="ror">https://ror.org/01fkw3y20</institution_id><institution_department>Department of Computing</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mark</given_name><surname>Toleman</surname><affiliations><institution><institution_name>University of Southern Queensland (USQ)</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mustafa</given_name><surname>Ally</surname><affiliations><institution><institution_name>University of Southern Queensland (USQ)</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Michael</given_name><surname>Lane</surname><affiliations><institution><institution_name>University of Southern Queensland (USQ)</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name></contributors><titles><title>The Impact of Ineffective ITG on IT Deployment: A Study of Failed IT Deployment Initiatives</title></titles><jats:abstract abstract-type="long"><jats:p>Organisations continue to make significant investments in Information Technology (IT) to enable business. To ensure a return on investment in IT, there is a need for a wider accountability focus on strategic technology initiatives alongside a structured and evaluative approach to the effective governance of IT. Throughout the last decade, systems, processes, standards and best practice frameworks have been developed to facilitate effective IT governance. However, IT deployment initiatives seem to continue to fail to deliver outcomes. This paper examines the impact of ineffective IT governance (ITG) on IT deployment failure in a set of failed IT projects. First, a literature review establishes the influencers (and indicators) of effective ITG. Next, a multiple case study analysis of failed IT deployment initiatives identifies key contributors to deployment failure. Finally, the outcome of the case study analysis is mapped back to the indicators of effective ITG derived from the literature review to determine a possible connection between failed IT deployment and ineffective IT governance. The outcome of the analysis demonstrates a connection between project failures and lack of effective ITG.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bn</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bn</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/04a52d2f-81c6-4861-9fee-3d4257fd88e4.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Florian</given_name><surname>Brachten</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Milad</given_name><surname>Mirbabaie</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Stefan</given_name><surname>Stieglitz</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Olivia</given_name><surname>Berger</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sarah</given_name><surname>Bludau</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kristina</given_name><surname>Schrickel</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id></institution></affiliations></person_name></contributors><titles><title>Threat or Opportunity? - Examining Social Bots in Social Media Crisis Communication</title></titles><jats:abstract abstract-type="long"><jats:p>Crisis situations are characterised by their sudden occurrence and an unclear information situation. In that context, social media platforms have become a highly utilised resource for collective information gathering to fill these gaps. However, there are indications that not only humans, but also social bots are active on these platforms during crisis situations. Although identifying the impact of social bots during extreme events seems to be a highly relevant topic, research remains sparse. To fill this research gap, we started a bigger project in analysing the influence of social bots during crisis situations. As a part of this project, we initially conducted a case study on the Manchester Bombing 2017 and analysed the social bot activity. Our results indicate that mainly benign bots are active during crisis situations. While the quantity of the bot accounts is rather low, their tweet activity indicates a high influence.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bo</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bo</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/e2ee3476-7936-41ae-9259-da727625fdf6.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Salvatore F</given_name><surname>Pileggi</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Antonio A</given_name><surname>Lopez-Lorca</surname><affiliations><institution><institution_name>University of Melbourne</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>School of Computing and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ghassan</given_name><surname>Beydoun</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name></contributors><titles><title>Ontology in Software Engineering</title></titles><jats:abstract abstract-type="long"><jats:p>During the past years, ontological thinking and design have become more and more popular in the field of Artificial Intelligence (AI). More recently, Software Engineering (SE) has evolved towards more conceptual approaches based on the extensive adoption of models and meta-models.</jats:p><jats:p>This paper briefly discusses the role of ontologies in SE according to a perspective that closely matches the theoretical life-cycle. These roles vary considerably across the development lifecycle. The use of ontologies to improve SE development activities is still relatively new (2000 onward), but it is definitely no more a novelty. Indeed, the role of such structures is well consolidated in certain SE aspects, such as requirement engineering. On the other hand, despite their well-known potential as knowledge representation mechanisms, ontologies are not completely exploited in the area of SE.</jats:p><jats:p>We first (i) proposes a brief overview of ontologies and their current understanding within the Semantic Web with a focus on the benefits provided; then, the role that ontologies play in the more specific context of SE is addressed (ii); finally, we deal with (iii) some brief considerations looking at specific types of software architecture, such as Multi-Agent Systems (MAS) and Service-Oriented Architecture (SOA).</jats:p><jats:p>The main limitation of our research is that we are focusing on traditional developments, where phases occur mostly sequentially. However, industry has fully embraced agile developments. It is unclear that agile practitioners are willing to adopt ontologies as a tool, unless we ensure that they can provide a clear benefit and they be used in a lean way, without introducing significant overhead to the agile development process.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bp</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bp</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/fb730979-1461-46c7-9b62-4c5ee0112801.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Sanjay</given_name><surname>Lama</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sojen</given_name><surname>Pradhan</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Anup</given_name><surname>Shrestha</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>David</given_name><surname>Beirman</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id></institution></affiliations></person_name></contributors><titles><title>Barriers of e-Tourism Adoption in Developing Countries: A Case Study of Nepal</title></titles><jats:abstract abstract-type="long"><jats:p>Developing countries lack e-tourism competencies despite attractive destinations to offer. Nepal is one of the developing countries with its natural beauty and diverse cultural heritage that has great tourism potential. This research is aimed at identifying barriers of e-tourism adoption in developing countries, using Nepal as a case study. Based on the Technology, Organization and Environment (TOE) and e-readiness models, and our literature review, we propose ten factors that affect e-tourism adoption. We applied mixed methods to validate these factors using seven interviews with relevant stakeholders and a survey of 198 tourism organisations in Nepal. The results demonstrate that e-tourism adoption is affected by environmental factors such as lack of national infrastructure, market size, and country-specific contextual factors. Similarly, organizational factors include lack of e-tourism awareness, lack of resources, low value proposition and limited top management support. Finally, we discuss these factors and its implication to policy and practice.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bq</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bq</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/0cc1c492-4daa-4ea3-bb4d-2c4c2bfef2ae.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Dengya</given_name><surname>Zhu</surname><affiliations><institution><institution_name>CBS, Curtin University, Perth, WA</institution_name><institution_id type="ror">https://ror.org/05xxpnn88</institution_id><institution_department>School of Management, Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Shastri L</given_name><surname>Nimmagadda</surname><affiliations><institution><institution_name>CBS, Curtin University, Perth, WA</institution_name><institution_id type="ror">https://ror.org/05xxpnn88</institution_id><institution_department>School of Management, Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Torsten</given_name><surname>Reiners</surname><affiliations><institution><institution_name>Curtin University, Perth, WA</institution_name><institution_department>School of Management, CBS</institution_department></institution></affiliations></person_name></contributors><titles><title>An Integrated Information Retrieval Framework for Managing the Digital Web Ecosystem</title></titles><jats:abstract abstract-type="long"><jats:p>The information explosion constrains the Digital Web Ecosystem exploration and makes challenging in retrieving relevant information and knowledge using Web search tools. The existing tools are not well integrated, and search results are inadequately managed. In this article, we describe effective information retrieval services for users and agents in various digital Web ecosystem scenarios. A novel Integrated Information Retrieval Framework (IIRF) is proposed, which employs the Web search technologies and traditional database searching techniques to provide comprehensive, dynamic, personalized, and organization-oriented information retrieval services, ranging from the Internet, intranet, to personal desktop. Experiments are carried out demonstrating the improvements in the search process with an average precision of Web search results to standard 11 recall level, attaining improvement from 41.7% of a comparable system to 65.2% of search. A 23.5% precision improvement is achieved with the framework. The comparison made among search engines presents similar development with satisfactory search results.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.br</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.br</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/77d71c73-3030-48e4-9a46-03acd82222ef.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Mujid</given_name><surname>Attar</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information System &amp; Modelling</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kyeong</given_name><surname>Kang</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information System &amp; Modelling</institution_department></institution></affiliations></person_name></contributors><titles><title>The Effect of Organisational Culture and Knowledge Environment on Organisational Success: Directions for Future Research</title></titles><jats:abstract abstract-type="long"><jats:p>Increasingly, organisations strive to shape their knowledge environment and organisational culture for improved performance and organisational success. Despite that, existing evidence recounts the individual role of organisational culture, knowledge management and intellectual capital towards organisational performance and success, a comprehensive explanation of the effect of multiple dimensions of these factors on organisational success remains unexplored. This paper adds to existing literature by proposing that an organisation’s knowledge environment combines its knowledge sharing practices (i.e. knowledge types, knowledge sharing approaches and knowledge sharing processes) and its intellectual capital. This paper presents a conceptual model on the relationship between organisational culture, knowledge environment and organisational success. The model proposes the role of organisational culture in shaping knowledge sharing practices, intellectual capital and organizational success. This research-in-progress concludes with directions for future research on the effect of organisational culture, knowledge sharing practices and intellectual capital on organisational success.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bs</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bs</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/af20d5d0-d6d7-444e-be3f-df99367dab40.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Jie (Kevin)</given_name><surname>Yan</surname><affiliations><institution><institution_name>Dalton State College</institution_name><institution_id type="ror">https://ror.org/01j4j8g47</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Dorothy</given_name><surname>Leidner</surname><affiliations><institution><institution_name>Baylor University and Lund University</institution_name><institution_id type="ror">https://ror.org/005781934</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Hind</given_name><surname>Benbya</surname><affiliations><institution><institution_name>Montpellier Business School</institution_name><institution_id type="ror">https://ror.org/037tw3m02</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Weifei</given_name><surname>Zou</surname><affiliations><institution><institution_name>Temple University</institution_name><institution_id type="ror">https://ror.org/00kx1jb78</institution_id></institution></affiliations></person_name></contributors><titles><title>The Interplay between Social Capital and Knowledge Contribution in Online User Communities</title></titles><jats:abstract abstract-type="long"><jats:p>Firms have been increasingly relying on online user communities (OUC) to access external, distant knowledge and expertise. Previous research on OUC has largely investigated the influence of individuals' social capital on their knowledge sharing behavior. In this study, we propose a spiral view on the relationship between social capital and knowledge contribution. We suggest that there are two-way interactions between individuals' social capital and their knowledge contribution in online user communities. To test our proposition, we collected and analysed participation data of 3,512 users from the OUC of BMC, a global leader in innovative software solutions. We discuss the theoretical and practical implications of our study for the online user community literature as well as the broader context of online community.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bt</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bt</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/5eadd304-0354-4ade-95de-1e03e89f98fc.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Muralidharan</given_name><surname>Ramakrishnan</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Anup</given_name><surname>Shrestha</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Aileen</given_name><surname>Cater-Steel</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jeffrey</given_name><surname>Soar</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name></contributors><titles><title>IT Service Management Knowledge Ecosystem – Literature Review and a Conceptual Model</title></titles><jats:abstract abstract-type="long"><jats:p>Information Technology Service Management (ITSM) is a customer-centric approach to manage IT Services in order to provide value to the business. The ITSM Knowledge ecosystem comprises multiple knowledge areas including process frameworks, technology tools and skills. Organisations struggle to comprehend the ecosystem due to the dynamic nature and volume of the business technology environment. A Systematic Literature Review was conducted to understand the state of the current research in ITSM knowledge ecosystem. The review indicated that the focus of the existing research is skewed towards process frameworks knowledge area and neglects tools and training. The approach proposed in the extant research fails to provide a holistic view of the ecosystem. To overcome the limitations a conceptual model is proposed based on Knowledge Commons theory.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bu</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bu</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/eaf3d2ac-b0e0-498d-841a-c305f06aeb4a.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Yohanes Dwi</given_name><surname>Anggoro</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Systems, Management and Leadership</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Suwin</given_name><surname>Sandu</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Systems, Management and Leadership</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ghassan</given_name><surname>Beydoun</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Systems, Management and Leadership</institution_department></institution></affiliations></person_name></contributors><titles><title>Uncovering Complexity in the Jakarta Energy Planning Process using Agent-Oriented Analysis</title></titles><jats:abstract abstract-type="long"><jats:p>The Jakarta Energy Planning Process (JEPP) is expected to be a successful template for other provinces in Indonesia. However, JEPP consists of a complex set of interrelated activities. These activities are fraught with difficulties and errors, including incorrectness, inconsistency, incompleteness, and redundancy in the process under which the Jakarta energy planning is undertaken. This paper aims to identify complexity issues in JEPP with the aim to alleviate these complexities using Agent-Oriented Analysis (AOA). This research uses the Design Science Research (DSR) method and towards the analysis employs seven Agent-Based Modellings (ABMs), including goal model, role model, organisation model, interaction model, environment model, agent model, and scenario model. The research consists of five stages: the synthesis of a preliminary knowledge analysis framework, the identification of complexity issues, recommendation synthesis, and finally the development of the complete knowledge analysis framework. While the analysis undertaken in this paper focuses on Jakarta, the developed knowledge analysis framework should be useful for energy planners in other regions, and research communities in general who are involved in such endeavours in developing complex planning processes.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bv</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bv</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/78026660-8b17-4a5b-93eb-9864932f5b31.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Aastha</given_name><surname>Pant</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Anup</given_name><surname>Shrestha</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Eric</given_name><surname>Kong</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mustafa</given_name><surname>Ally</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name></contributors><titles><title>Facilitating Knowledge Transfer based on a Resource Based View of Tacit Knowledge Stock: A Skills Assessment Perspective</title></titles><jats:abstract abstract-type="long"><jats:p>Resource Based View posits the use of internal resources for competitive advantage which is often evaluated using four questions on value, rarity, imitability and organisation, also known as the VRIO framework. We focus on the organisational resource of tacit knowledge – characterized by knowledge that is difficult to transfer. Knowledge transfer begins with the identification of knowledge stock. Using the Design Science Research Methodology, we develop and evaluate a skills assessment method to measure tacit knowledge stock of an organisation based on the Skills Framework of the Information Age (SFIA). The method is evaluated in an Australian bank during its digital innovation initiative. We found that knowledge transfer is most effective when the person or party that is transferring knowledge has prior understanding of the receivers’ knowledge stock. This finding has significant implications to practice in the area of knowledge management.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bw</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bw</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/4b1f6dbc-a42a-4cf5-96fd-a71c0d5e9aeb.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Saleem</given_name><surname>Malik</surname><affiliations><institution><institution_name>Federation University Australia</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id><institution_department>Faculty of Science and Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Madhu</given_name><surname>Chetty</surname><affiliations><institution><institution_name>Federation University Australia</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id><institution_department>Faculty of Science and Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mehmood</given_name><surname>Chadhar</surname><affiliations><institution><institution_name>Federation University Australia</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id><institution_department>Faculty of Science and Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>Information Technology and Organizational Learning Interplay: A Survey</title></titles><jats:abstract abstract-type="long"><jats:p>The objective of this paper is to provide a systematic review of the evolutionary trends in the research domain of information technology and organizational learning. Having surveyed various journals and key conferences between 2000 and 2018 on the topic, we observe that information technology (IT) has expanded from its general form to various contemporary information systems, e.g. knowledge organization systems, communication and collaborative systems and decision support systems. However, organization learning (OL) now essentially occurs through knowledge management activities, e.g. knowledge acquisition, storing, sharing and application of knowledge. The survey reported here not only validates the interplay of IT and OL but also reveals some important intervening factors between IT and OL, e.g. absorptive capacity, organization culture, user trust, acceptance and satisfaction that work as deterministic elements in the reciprocal relationship of IT and OL. We propose future research to explore interaction between big data analytical systems and organizational learning.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bx</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bx</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/adb22ef2-6c45-4bb1-bf24-a7f2ac94bd78.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Aaron</given_name><surname>Bere</surname><affiliations><institution><institution_name>School of Information of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Hepu</given_name><surname>Deng</surname><affiliations><institution><institution_name>School of Information of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Richard</given_name><surname>Tay</surname><affiliations><institution><institution_name>School of Information of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name></contributors><titles><title>Assessing the impact of using instant messaging in eLearning on the performance of teaching and learning in higher education</title></titles><jats:abstract abstract-type="long"><jats:p>There are growing interests in improving teaching and learning performance through eLearning using specific emerging technologies in higher education. As a result, understanding the impact of using such technologies on the performance of teaching and learning is becoming important. This experimental study investigates the impact of eLearning using instant messaging on the performance of teaching and learning in higher education in developing countries. Pre-test and post-test surveys are used for collecting experimental data from participants to investigate the impact of using instant messaging on teaching and learning. Data analysis conducted quantitatively using SPSS reveals that eLearning using instant messaging improves teaching and learning. In particular, the use of instant messaging in eLearning is more effective than face-to-face teaching and learning with respect to the overall performance in the classroom. This leads to the conclusion that eLearning using instant messaging could transform teaching and learning in higher education in developing countries.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.by</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.by</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/b90707ac-fbd3-45cc-833f-436de5ecfbec.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Vince</given_name><surname>Bruno</surname><affiliations><institution><institution_name>School of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Joan</given_name><surname>Richardson</surname><affiliations><institution><institution_name>School of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jim</given_name><surname>McGovern</surname><affiliations><institution><institution_name>School of Business IT and Logistics RMIT University</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id></institution></affiliations></person_name></contributors><titles><title>Names and Faces: a staff dashboard to support student learning engagement</title></titles><jats:abstract abstract-type="long"><jats:p>This paper describes the in-progress development and preliminary evaluation of a dashboard to support student-centred higher education. The dashboard, known as Names and Faces, aims to provide easy access to the data teaching staff need to proactively foster student engagement, and to improve the student’s overall university experience. Names and Faces brings together data from disparate systems, and provides a highly visual interface that meets the needs of a wide range of teaching staff. Importantly, the prototype has been developed by academic staff in collaboration with other academics using an iterative prototyping approach. 48 academic staff have used the prototype over two semesters, identifying new data sources and interfaces to be incorporated in future iterations. This project contributes to the development of improved information support for student-centred education, but also to academic information systems in terms of data integration, usability, and user-centred design.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.bz</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.bz</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/71c3e583-75e9-42af-a3a5-e4b177170928.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Taiwo</given_name><surname>Oseni</surname><affiliations><institution><institution_name>Federation University Australia</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mehmood</given_name><surname>Chadhar</surname><affiliations><institution><institution_name>Federation University Australia</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sasha</given_name><surname>Ivkovic</surname><affiliations><institution><institution_name>Federation University Australia</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sally</given_name><surname>Firmin</surname><affiliations><institution><institution_name>Federation University Australia</institution_name><institution_id type="ror">https://ror.org/05qbzwv83</institution_id></institution></affiliations></person_name></contributors><titles><title>Organisational Learning with SaaS CRM – A case study of Higher Education</title></titles><jats:abstract abstract-type="long"><jats:p>Customer Relationship Management (CRM) generally has a reputation as a technology that does not live up to its over-inflated expectations. Yet, implementations in higher education remain on the rise. Higher Education institutions (HEIs) are embracing cloud-based CRM systems to upsurge performance, encourage better management practices, and enhance their relationship with staff and students. CRM success however relies heavily on an adaptive organisational learning (OL) process upon which proactive decisions can be made. This paper emphasises that committed learning in post-implementation use is paramount to attaining further understanding of the capabilities, features and functionality of the CRM. Investigating how SaaS CRM usage reflect an organisation’s learning in a Higher Education context, the paper presents theoretical and practical contributions in a framework for effective SaaS CRM utilisation, and recommends a continuous cycle of exploration-exploitation-exploration. Yet the reality is that organisations explore, exploit, and then stop exploring.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ca</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ca</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/4e542f8a-035f-412e-908a-9ffe8a314feb.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Quy</given_name><surname>Nguyen</surname><affiliations><institution><institution_name>University of Information Technology</institution_name><institution_id type="ror">https://ror.org/03bxja712</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Rob</given_name><surname>Meredith</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Frada</given_name><surname>Burstein</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id></institution></affiliations></person_name></contributors><titles><title>A Comparative Study of Critical Success Factors for General and Healthcare Business Intelligence Systems</title></titles><jats:abstract abstract-type="long"><jats:p>Critical Success Factor (CSF) research provides a useful instrument for better managing a project and driving it to success. Research about CSFs for business intelligence (BI) systems and industry-specific CSFs have been noted; however, scant research has been conducted to investigate CSFs for healthcare BI projects. This paper adopted a mixed method approach to investigate differences between CSFs of BI systems in general and BI systems in the healthcare industry. We found that although CSFs of healthcare BI are similar to those of general BI, there is a significant overlap between CSFs for BI development and use. This finding supports the intertwined relationship between success of different BI project phases, which has yet been acknowledged in BI and IS success models.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cb</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cb</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/59789d03-b3a3-421f-8c58-c3c8b5a51419.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Neethu</given_name><surname>Mathai</surname><affiliations><institution><institution_name>Murdoch University</institution_name><institution_id type="ror">https://ror.org/00r4sry34</institution_id><institution_department>School of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mohd Fairuz</given_name><surname>Shiratuddin</surname><affiliations><institution><institution_name>Murdoch University</institution_name><institution_id type="ror">https://ror.org/00r4sry34</institution_id><institution_department>School of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ferdous</given_name><surname>Sohel</surname><affiliations><institution><institution_name>Murdoch University</institution_name><institution_id type="ror">https://ror.org/00r4sry34</institution_id><institution_department>School of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Xuequn</given_name><surname>Wang</surname><affiliations><institution><institution_name>Murdoch University</institution_name><institution_id type="ror">https://ror.org/00r4sry34</institution_id><institution_department>School of Engineering and Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>Consumer Perceptions in the Adoption of the Electronic Health Records in Australia: A Pilot Study</title></titles><jats:abstract abstract-type="long"><jats:p>The paper reports an empirical investigation of the factors affecting consumer perceptions of the adoption of Electronic Health Records in Australia. This paper also details the processes involved in the pilot testing of the instrument where it has been pilot-tested to a convenience sample by sending individual postal survey envelopes to shortlisted community organisations in Australia.</jats:p><jats:p>Reliability analysis to check the internal consistency was performed using the Cronbach’s alpha. Content validity was achieved by reviewing the instrument with a panel of experts. The results of this pilot study proved the feasibility of a full-scale study and these could be used as the basis for refinement of the instrument. Based upon the outcome of validity and reliability testing, items for the final instrument were identified. The findings showed that the tested model does fit the data well and has a significant and positive impact on the consumer’s attitude in using the EHR.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cc</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cc</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/776778af-a058-4271-9e68-a5b8dbe21cb2.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Yujing</given_name><surname>Xu</surname><affiliations><institution><institution_name>City University of Hong Kong</institution_name><institution_id type="ror">https://ror.org/03q8dnn23</institution_id><institution_department>Department of Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Yu</given_name><surname>Tong</surname><affiliations><institution><institution_name>Zhejiang University</institution_name><institution_id type="ror">https://ror.org/00a2xv884</institution_id><institution_department>School of Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Stephen Shaoyi</given_name><surname>Liao</surname><affiliations><institution><institution_name>City University of Hong Kong</institution_name><institution_id type="ror">https://ror.org/03q8dnn23</institution_id><institution_department>Department of Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Self-Control Matters: Examining Indirect Use of Hospital Information Systems and its Control Mechanisms</title></titles><jats:abstract abstract-type="long"><jats:p>The indirect use of hospital information systems (HIS), that is, the indirect interaction of designated physicians with HIS by delegating HIT-related tasks to others, has become a popular phenomenon in hospitals. Indirect use frees physicians from busywork and helps them achieve improved productivity. However, the agency theory and organization literature indicate that the consequences of indirect use may depart from physicians’ expectations because of agency problems. To resolve such challenges, prior work places great emphasis on formal control and social control. Considering the nature of hospital settings, this study proposes that an agent’s self-control could also be a prominent control mechanism. To obtain a comprehensive understanding, this study builds a research model that depicts the impacts of three control mechanisms and their interplays on indirect use performance. The proposed methodology and preliminary findings are also discussed to provide insights into how to conduct indirect use efficiently and effectively.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cd</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cd</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/cb3480f9-f297-4f46-ae53-d8848e0db364.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Mohan</given_name><surname>Tanniru</surname><affiliations><institution><institution_name>Henry Ford Health System</institution_name><institution_id type="ror">https://ror.org/02kwnkm68</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kamaljeet</given_name><surname>Sandhu</surname><affiliations><institution><institution_name>University of New England</institution_name><institution_id type="ror">https://ror.org/02n2ava60</institution_id></institution></affiliations></person_name></contributors><titles><title>Engagement Leading to Empowerment-Digital Innovation Strategies for Patient Care Continuity</title></titles><jats:abstract abstract-type="long"><jats:p>Digital innovations have started to extend the value chain into the customer decision making process, enabling firms to support two major types of customer services: empowerment prior to customer purchase and engagement during and post-purchase. Service organizations such as health care firms, by virtue of their intense engagement with patients during in-patient care, have a unique opportunity to empower patients’ health care choices once they become outpatients. Understanding patient ecosystems and social support networks during this engagement has important implications for the digital transformation of care-related support to reduce health care costs and also empower patients to self-manage their health. This research uses a framework to develop alternative care support environments and, using four case studies, to develop a research agenda for digital transformation to support the empowerment of health care consumers by engaging them effectively inside the hospital.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ce</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ce</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/51b0aef2-abb0-46ff-8a7c-fea09a1a81fe.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Atae Rezaei</given_name><surname>Aghdam</surname><affiliations><institution><institution_name>Queensland University of Technology (QUT)</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jason</given_name><surname>Watson</surname><affiliations><institution><institution_name>Queensland University of Technology (QUT)</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Hasti</given_name><surname>Ziaimatin</surname><affiliations><institution><institution_name>Queensland University of Technology (QUT)</institution_name><institution_id type="ror">https://ror.org/03pnv4752</institution_id></institution></affiliations></person_name></contributors><titles><title>Online Value Co-Creation in the Healthcare Service Ecosystem: A Review</title></titles><jats:abstract abstract-type="long"><jats:p>Nowadays, the role of patients in the healthcare domain is extending beyond being passive healthcare recipients to becoming “makers and shapers” of healthcare services. In the healthcare service ecosystem, Online Health Communities (OHCs) foster co-creation among the different actors. Over the last five years, a number of articles that focus on value co-creation in the healthcare services have surfaced that highlight the significance of the interactions and engagements between the healthcare ecosystem levels. Accordingly, this paper aims to conduct a systematic review of the literature focusing on the role of OHCs as facilitators of value co-creation in the healthcare service ecosystem. A systematic review of the literature was conducted with articles published between 2013 and 2018. Thematic analysis revealed three key themes including “value is ubiquitous”, “online resources connectivism”, and “informational and emotional support”. This paper provides a structured overview of the current literature and identifies opportunities for future research.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cf</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cf</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/b77cc7f1-abac-4768-993c-614d27732416.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Isabella</given_name><surname>Eigner</surname><affiliations><institution><institution_name>Friedrich-Alexander-University Erlangen-Nuremberg</institution_name><institution_id type="ror">https://ror.org/00f7hpc57</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Daniel</given_name><surname>Reischl</surname><affiliations><institution><institution_name>Friedrich-Alexander-University Erlangen-Nuremberg</institution_name><institution_id type="ror">https://ror.org/00f7hpc57</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Freimut</given_name><surname>Bodendorf</surname><affiliations><institution><institution_name>Friedrich-Alexander-University Erlangen-Nuremberg</institution_name><institution_id type="ror">https://ror.org/00f7hpc57</institution_id></institution></affiliations></person_name></contributors><titles><title>Development and evaluation of ensemble-based classification models for predicting unplanned hospital readmissions after hysterectomy</title></titles><jats:abstract abstract-type="long"><jats:p>Unplanned hospital readmissions are a key indicator of quality in healthcare and can lead to high unnecessary costs for the hospital due to additional required resources or reduced payments by insurers or governments. Predictive analytics can support the identification of patients at high-risk for readmission early on to enable timely interventions. In Australia, hysterectomies present the 2nd highest observed readmission rates of all surgical procedures in public hospitals. Prior research so far only focuses on developing explanatory models to identify associated risk factors for past patients. In this study, we develop and compare 24 prediction models using state-of-the-art sampling and ensemble methods to counter common problems in readmission prediction, such as imbalanced data and poor performance of individual classifiers. The application and evaluation of these models are presented, resulting in an excellent predictive power with under- and oversampling and an additional slight increase in performance when combined with ensemble methods.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cg</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cg</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/c6a89c79-37cd-4aa4-ad06-ebdcca232f2f.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Atlarelang Basetsana</given_name><surname>Kesiilwe</surname><affiliations><institution><institution_name>The University of Melbourne, Victoria</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>School of Computing and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Reeva</given_name><surname>Lederman</surname><affiliations><institution><institution_name>The University of Melbourne, Victoria</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>School of Computing and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Suelette</given_name><surname>Dreyfus</surname><affiliations><institution><institution_name>The University of Melbourne, Victoria</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>School of Computing and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jonathan</given_name><surname>Knott</surname><affiliations><institution><institution_name>The Royal Melbourne Hospital, Victoria</institution_name><institution_id type="ror">https://ror.org/005bvs909</institution_id><institution_department>Department of Emergency Medicine</institution_department></institution></affiliations></person_name></contributors><titles><title>The impact of information systems on work structure and culture in an emergency department</title></titles><jats:abstract abstract-type="long"><jats:p>This paper describes a study where consultants in an emergency department will be observed and interviewed with the aim of evaluating the impact of the progressive implementation of an information system in an emergency department in a metropolitan hospital in Australia. The study is the third stage of a 3-stage longitudinal study which is building on data from two previous studies that were conducted in the same setting in 2008 and 2012. The evaluations will be based on predefined task categories to investigate how information systems in health settings affect time and prioritisation of tasks. The study aims to understand how the changes brought by information systems implementation can be managed to fit in with the structure and culture of work in the hospital setting. The outcome of this research will inform guidelines for how information systems for hospitals can be designed and implemented.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ch</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ch</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/ffca10db-98e3-473b-b0d3-d47c581c42b2.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Sophie</given_name><surname>Cockcroft</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Management and Enterprise</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jane</given_name><surname>Hendy</surname><affiliations><institution><institution_name>Brunel University, London</institution_name><institution_id type="ror">https://ror.org/00dn4t376</institution_id></institution></affiliations></person_name></contributors><titles><title>Telehealth Adoption: Three case studies at the organisational level</title></titles><jats:abstract abstract-type="long"><jats:p>We present the results of an inductive analysis using interview data to establish core themes in organisational level adoption of telehealth. The source of the interview data was a large study to evaluate how telehealth can promote long term health and independence and improve quality of life for people suffering from chronic health conditions. The study took place over three different pilot sites and 41 interviews were conducted with healthcare professionals who collectively had responsibility for over 5000 patients. We explore the data from the perspective of the organisation, focussing on the unique features of each pilot site and seeking evidence for themes of adoption success at the organisational level, particularly via organisational identity. We explore the data via a set of propositions based on organisational identity theory and models of technology adoption. The major finding of this work is that experience in the adoption of telecare was found to detract from telehealth adoption success.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ci</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ci</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/85215ec7-e96f-408b-9fe2-bb3ad1491c24.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Adam</given_name><surname>Poulsen</surname><affiliations><institution><institution_name>Charles Sturt University</institution_name><institution_id type="ror">https://ror.org/00wfvh315</institution_id><institution_department>School of Computing &amp; Mathematics</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Oliver K</given_name><surname>Burmeister</surname><affiliations><institution><institution_name>Charles Sturt University</institution_name><institution_id type="ror">https://ror.org/00wfvh315</institution_id><institution_department>School of Computing &amp; Mathematics</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>David</given_name><surname>Tien</surname><affiliations><institution><institution_name>Charles Sturt University</institution_name><institution_id type="ror">https://ror.org/00wfvh315</institution_id><institution_department>School of Computing &amp; Mathematics</institution_department></institution></affiliations></person_name></contributors><titles><title>A New Design Approach and Framework for Elderly Care Robots</title></titles><jats:abstract abstract-type="long"><jats:p>A relatively new area within information systems is the design of robotic healthcare. This narrative review considers the question, how does one ethically design an elderly care robot? To answer this question, robot ethicists consider the ethical impact of robots, how designers ought to design robots ethically, and how a robot design ought to be, so its behaviour is ethical. The latter consideration defines another field of study, machine ethics. Machine ethicists ask, how does one design a robot information system to behave ethically? Thus, robot ethics is concerned with the ethics of design practice, whereas machine ethics is concerned with the ethics of the product designed. The findings from this narrative review point the way forward to how one can answer both questions with a new design approach that is grounded in care and professional ethics, value sensitive design, and the integration of two machine ethics schools of thought.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cj</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cj</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/350b3747-3b57-4a63-86b0-af3a1578c40f.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Hajar</given_name><surname>Alamri</surname><affiliations><institution><institution_name>King Khalid University</institution_name><institution_id type="ror">https://ror.org/052kwzs30</institution_id><institution_department>Department of Computer Science and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Reeva</given_name><surname>Lederman</surname><affiliations><institution><institution_name>University of Melbourne</institution_name><institution_id type="ror">https://ror.org/01ej9dk98</institution_id><institution_department>Department of Computing and Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Rachelle</given_name><surname>Bosua</surname><affiliations><institution><institution_name>Open University of The Netherlands</institution_name><institution_id type="ror">https://ror.org/018dfmf50</institution_id></institution></affiliations></person_name></contributors><titles><title>Using Online Photo Sharing to Support Parents with Type One Diabetic Children</title></titles><jats:abstract abstract-type="long"><jats:p>The rise of online photo sharing platforms has encouraged an increasing number of people to share online their lived experience as a carer of a child with a chronic condition. This study aims to explore the effectiveness of using online photo sharing platforms to support parents of chronically ill children. We use individual interviews and an analysis of Instagram posts to study parents of Type 1 diabetic children who actively engage in photo sharing. Findings show online photo sharing supports parents in coping with their child’s condition and in sharing their experience with and supporting other parents. Photos have a significant capacity to deliver personal experience and therefore in enhancing relationships between participants. Participants express the greater ability of photos over text in validating their experience. More specifically, personal photos create more trust in the provided information. This supports the idea that photo sharing can provide opportunities for emotions-focused coping skills, not as easily provided by text.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ck</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ck</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/9be8a602-e52e-42b2-90cc-e5bf92c9ef42.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Mike</given_name><surname>Seymour</surname><affiliations><institution><institution_name>University of Sydney</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Dirk S.</given_name><surname>Hovorka</surname><affiliations><institution><institution_name>University of Sydney</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Judy</given_name><surname>Kay</surname><affiliations><institution><institution_name>University of Sydney</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id></institution></affiliations></person_name></contributors><titles><title>Shared Experiences</title></titles><jats:abstract abstract-type="long"><jats:p>Disciplines often approach phenomena from different perspectives and with different research tools. We offer this example of our efforts to embrace the wider CHI values through the exploration of emotive digital humans deployed in HCI. We designed and conducted an HCI experiment with mixed methods. In building an infrastructure that benefits from the strengths of both AIS SIGHCI and ACM SIGCHI research communities, we chose an approach that could reveal undisclosed worlds, hard to see from just one perspective. As technology offers HCI digital humans, new combined shared approaches may be needed to gain insights, especially prior to their wide scale deployment. As bridging related disciplines have failed in the past, perhaps a new approach is needed, one of shared experiences, especially when exploring new technological phenomenon.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cl</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cl</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/e615f8ef-0b2a-498f-bfc1-6ffc6c818bb6.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Natalie</given_name><surname>Hardwicke</surname><affiliations><institution><institution_name>The University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Discipline of Business Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Tim</given_name><surname>Mahlberg</surname><affiliations><institution><institution_name>The University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Discipline of Business Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kai</given_name><surname>Riemer</surname><affiliations><institution><institution_name>The University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Discipline of Business Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>The Existential Doctorate: Liminality in Industry-Academic Doctoral Partnerships</title></titles><jats:abstract abstract-type="long"><jats:p>Formalised industry-academic doctoral partnerships are increasingly sought as a way to bring academia and industry closer together. However, existing approaches appear to either reinforce the divide between the two “worlds” or acknowledge their independence. By focusing on both the doctoral candidate and their supervisor, we problematise existing doctoral partnership models in order to foreground our own “liminal” and “existential” doctoral experience. We provide self-reflections to discuss how the worlds of industry and academia can be transcended through the “liminal self”, as matters of being and belonging are brought into question as the embedded doctoral researcher navigates the two worlds. As a sensemaking process, our paper showcases an innovative and promising approach towards doctoral research; one where the candidate’s philosophical contemplation of their identity comes to play an irrevocable role in the exploration of an empirical phenomenon.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cm</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cm</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/2299135f-d64a-4e9a-871e-88f460ef1852.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Joel</given_name><surname>Kininmonth</surname><affiliations><institution><institution_name>Curtin University</institution_name><institution_id type="ror">https://ror.org/02n415q13</institution_id><institution_department>School of Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Nik</given_name><surname>Thompson</surname><affiliations><institution><institution_name>Curtin University</institution_name><institution_id type="ror">https://ror.org/02n415q13</institution_id><institution_department>School of Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Tanya</given_name><surname>McGill</surname><affiliations><institution><institution_name>Murdoch University</institution_name><institution_id type="ror">https://ror.org/00r4sry34</institution_id><institution_department>School of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Anna</given_name><surname>Bunn</surname><affiliations><institution><institution_name>Curtin University</institution_name><institution_id type="ror">https://ror.org/02n415q13</institution_id></institution></affiliations></person_name></contributors><titles><title>Privacy Concerns and Acceptance of Government Surveillance in Australia</title></titles><jats:abstract abstract-type="long"><jats:p>Increases in routine data collection and surveillance in recent years have resulted in ongoing tension between citizens’ privacy concerns, perceived need for government surveillance and acceptance of policies. We address the lack of Australia focussed research through an online survey of 100 Australian residents. Data was analysed using PLS, revealing that privacy concerns around collection influence acceptance of surveillance but do not influence enactment of privacy protections. Conversely, respondents’ concerns about secondary use of data were unrelated to their levels of acceptance, yet were a significant determinant of privacy protections. These findings suggest that respondents conflate surveillance with collection of data, and may not consider subsequent secondary use. This highlights the multi-dimensional nature of privacy which must be studied at sufficiently granular level to draw meaningful conclusions. Our research also considers the role of trust in government, and perceived need for surveillance and these findings are discussed with their implications.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cn</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cn</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/5a91839f-9a48-4bb4-b5e1-16662de73631.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Tanya</given_name><surname>McGill</surname><affiliations><institution><institution_name>Murdoch University</institution_name><institution_id type="ror">https://ror.org/00r4sry34</institution_id><institution_department>School of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Nik</given_name><surname>Thompson</surname><affiliations><institution><institution_name>Curtin University</institution_name><institution_id type="ror">https://ror.org/02n415q13</institution_id><institution_department>School of Management</institution_department></institution></affiliations></person_name></contributors><titles><title>Gender Differences in Information Security Perceptions and Behaviour</title></titles><jats:abstract abstract-type="long"><jats:p>Information security is of universal concern to computer users from all walks of life. Though gender differences in technology adoption are well researched, scant attention has been devoted to the study of gender differences in information security. We address this research gap by investigating how information security perceptions and behaviours vary between genders in a study involving 624 home users. The results reveal that females exhibit significantly lower overall levels of security behaviour than males. Furthermore, individual perceptions and behaviours in many cases also vary by gender. Our work provides evidence that gender effects should be considered when formulating information security education, training, and awareness initiatives. It also provides a foundation for future work to explore information security gender differences more deeply.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.co</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.co</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/ab4324c2-7822-42aa-9b4a-74008dae2dff.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Lemuria</given_name><surname>Carter</surname><affiliations><institution><institution_name>University of New South Wales</institution_name><institution_id type="ror">https://ror.org/03r8z3t63</institution_id><institution_department>School of Information Systems &amp; Technology Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Dapeng</given_name><surname>Liu</surname><affiliations><institution><institution_name>Virginia Commonwealth University</institution_name><institution_id type="ror">https://ror.org/02nkdxk79</institution_id></institution></affiliations></person_name></contributors><titles><title>Technology humanness, trust and e-government adoption</title></titles><jats:abstract abstract-type="long"><jats:p>With regards to technology adoption, users may be influenced by trust in two forms – human-like trust (e.g., benevolence, integrity, and ability) and system-like trust (e.g., helpfulness, reliability, and functionality). While the literature interestingly differentiates the use of these two types of trust, insufficient efforts have been devoted to examine and explain which type of trust should be used in the context of e-government. Additionally, when government agencies increasingly experience security breaches, insufficient literature examines how human-like trust and system-like trust may be influenced by such important antecedents as security threats and citizens’ security concerns in e-government settings. We propose a conceptual model to address this gap in the literature.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cp</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cp</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/c2afe99e-8a47-404d-8db2-7123f951468b.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Dale</given_name><surname>Kleeman</surname><affiliations><institution><institution_name>University of Canberra</institution_name><institution_id type="ror">https://ror.org/04s1nv328</institution_id><institution_department>School of Information Technology and Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Information Security Perceptions of Users, Levels of Engagement and Developer Resistance</title></titles><jats:abstract abstract-type="long"><jats:p>This paper reports on a case study considering the propensity for a range of stakeholders to engage with information security issues during a major development project as part of a project considering the user involvement with the elicitation of information security requirements. Also examined were the attitudes of IT managers and project team members.</jats:p><jats:p>The research found that many users have an interest in being involved with information security issue, but their concerns meant they would need to be supported during any information security requirements gathering process. While business areas were interested in being involved, there was resistance from developers and this would require careful management. It was found that most users had a simplistic view of information security, largely limited to issues around access privileges.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cq</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cq</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/d42ef1a4-5268-472b-aff1-bfaf60e160c0.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Cong</given_name><surname>Cao</surname><affiliations><institution><institution_name>University of Wollongong</institution_name><institution_id type="ror">https://ror.org/00jtmb277</institution_id><institution_department>School of Computing and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jun</given_name><surname>Yan</surname><affiliations><institution><institution_name>University of Wollongong</institution_name><institution_id type="ror">https://ror.org/00jtmb277</institution_id><institution_department>School of Computing and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mengxiang</given_name><surname>Li</surname><affiliations><institution><institution_name>Hong Kong Baptist University</institution_name><institution_id type="ror">https://ror.org/0145fw131</institution_id></institution></affiliations></person_name></contributors><titles><title>Understanding the Influencing Factors of the Effectiveness of Trusted Third Party's Trust Transformation</title></titles><jats:abstract abstract-type="long"><jats:p>Through the experimental data analysis, this paper found that trusted third parties (TTPs) can effectively reduce the trust barrier of consumers. Furthermore, we point out that TTPs have the function of trust transfer, which provides a meaningful framework for our understanding of the mechanism of TTPs. According to this research, consumers’ trust in unfamiliar enterprises is built on their trust of TTPs. The chain relationship of TTPs’ trust and certification of enterprises and consumers’ recognition of TTPs enables the transfer of consumer trust to enterprises and finally leads to consumers’ trust in these enterprises. Also, the reputation and presentation of TTPs can have a significant influence on the trust transfer. The results further reveal the internal mechanism of TTPs and clarify the regulatory factors that influence the trust transfer. These findings are helpful for understanding and extension of relevant theories and enterprises’ decision making on TTPs.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cr</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cr</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/46407af9-b5fe-46ef-a819-5a77ea1565f7.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Hiep-Cong</given_name><surname>Pham</surname><affiliations><institution><institution_name>RMIT University Vietnam</institution_name><institution_id type="ror">https://ror.org/004axh929</institution_id><institution_department>School of Business and Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Irfan</given_name><surname>Ulhaq</surname><affiliations><institution><institution_name>RMIT University Vietnam</institution_name><institution_id type="ror">https://ror.org/004axh929</institution_id><institution_department>School of Business and Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mathews</given_name><surname>Nkhoma</surname><affiliations><institution><institution_name>RMIT University Vietnam</institution_name><institution_id type="ror">https://ror.org/004axh929</institution_id><institution_department>School of Business and Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Minh Nhat</given_name><surname>Nguyen</surname><affiliations><institution><institution_name>RMIT University Vietnam</institution_name><institution_id type="ror">https://ror.org/004axh929</institution_id><institution_department>School of Business and Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Linda</given_name><surname>Brennan</surname><affiliations><institution><institution_name>RMIT University Australia</institution_name><institution_id type="ror">https://ror.org/04ttjf776</institution_id><institution_department>School of Media &amp; Communication</institution_department></institution></affiliations></person_name></contributors><titles><title>Exploring Knowledge Sharing Practices for Raising Security Awareness</title></titles><jats:abstract abstract-type="long"><jats:p>This study aims to explore the types of information can be effectively communicated in three knowledge-sharing methods and their impact on employees’ security practice. On one end, guarding the organisation’s information system against cyber-attacks is critical and improving users’ knowledge and skills is a common approach to any security program. On the other end, organisations lack a clear understanding in determining what types of security information should be delivered through various methods of communication to be effective in boosting users’ knowledge and compliance behaviour. The study employed a qualitative method using semi-structured interviews with business users in Vietnam. The initial findings indicate a single method of knowledge and skill development is not sufficient to assist users to deal with complex and constant changing security needs. It is necessary to further experiment methods of encouraging formal and peer knowledge sharing that can support individual effort in complying with security policies.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cs</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cs</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/4d483508-1688-415f-9b37-fe1d93b49078.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Abdulaziz</given_name><surname>Al-Ghazi</surname><affiliations><institution><institution_name>University of Wollongong</institution_name><institution_id type="ror">https://ror.org/00jtmb277</institution_id><institution_department>School of Computing and information technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Tingru</given_name><surname>Cui</surname><affiliations><institution><institution_name>University of Wollongong</institution_name><institution_id type="ror">https://ror.org/00jtmb277</institution_id><institution_department>School of Computing and information technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Samuel</given_name><surname>Fosso</surname><affiliations><institution><institution_name>Toulouse Business School</institution_name><institution_id type="ror">https://ror.org/0349y2q65</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mengxiang</given_name><surname>Li</surname><affiliations><institution><institution_name>Hong Kong Baptist University</institution_name><institution_id type="ror">https://ror.org/0145fw131</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jun</given_name><surname>Shen</surname><affiliations><institution><institution_name>University of Wollongong</institution_name><institution_id type="ror">https://ror.org/00jtmb277</institution_id><institution_department>School of Computing and information technology</institution_department></institution></affiliations></person_name></contributors><titles><title>Assessing the Determinants of Business Value Related to IT Projects: A Strategic Alignment Perspective of Public-Sector Organisations in Saudi Arabia</title></titles><jats:abstract abstract-type="long"><jats:p>Strategic alignment is considered an important construct in the study of business value related to IT projects. The proposed research study aims to identify and analyse the key determinants of business value related to IT projects using a business/IT strategy alignment perspective in Saudi public-sector organisations. The study will utilise a mixed methods design that includes a sample of senior managerial staff drawn from the financial and economic sectors in Saudi Arabia. Qualitative data will be collected via semi-structured interviews (n=15-20 participants) and quantitative data will be collected via survey (n=150-200 participants). Quantitative data will be analysed using SmartPLS software and qualitative data will be analysed using the NVivo software. The key findings from the data set will be discussed in depth to provide a deeper understanding of the determinants of business value related to IT projects from a strategic alignment perspective in public-sector organisations in Saudi Arabia.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.ct</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.ct</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/920f6db2-99db-4941-a213-408c34b6f7d8.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Anushke</given_name><surname>Guneratne</surname><affiliations><institution><institution_name>Macquarie University</institution_name><institution_id type="ror">https://ror.org/01sf06y89</institution_id><institution_department>Department of Computing</institution_department></institution></affiliations></person_name></contributors><titles><title>Information System resilience among Non-profits: Peak led collaboration as strategy for development</title></titles><jats:abstract abstract-type="long"><jats:p>Community legal centres (CLCs) are a special type of non-profit in Australia. These communities based organisations have operated in a considerably volatile funding environment. The funding limitations compounded by the relative size, and lightweight administration are a significant source of vulnerability which cannot be reduced by individual organisations. Their key strength is in community, engaging stakeholders and collaborating, which has helped CLCs continue functioning. This paper uses the development of a Customer Relationship Management system (CRM) by a peak body to investigate the notion that collaboration as a development strategy improves Information System development resilience. The strategic role of a peak body in relationship to its constituent organisations in the non-profit sector was found to be very important in creating system resilience.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cu</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cu</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/bdbc339c-22b4-44c0-bc6b-81d83b75ff04.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Christofer</given_name><surname>Tolis</surname><affiliations><institution><institution_name>Combitech AB</institution_name></institution></affiliations></person_name></contributors><titles><title>Strategic Resilience: A Case of Collaborative Exploration of Land-use Planning and Total Defence</title></titles><jats:abstract abstract-type="long"><jats:p>Strategic resilience concerns broad societal issues and long-term processes to successfully handle severe disturbances such as crises and war. This paper presents a case study of a Swedish exploration project to investigate how civil defence interests may influence land-use planning through legislation on national interests. The project brought together two disparate areas and involved collaborative exploration through representatives from both communities. Through a large workshop, representatives from a number of governmental agencies came together to develop and discuss examples of national interests for civil defence. Continued work following the workshop revealed five key questions, each contributing towards a shared understanding of specific possibilities and limitations. The questions concerned issues of boundaries, contents, importance, location, and value, thereby providing input to a proposed sector description to be used when deciding whether to start handling actual national interest claims for civil defence or not. Through the work reported, the paper illustrates recurring challenges with handling divergent and shared meanings, balancing of logical and physical aspects, and bridging of means and ends in collaborative exploration.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cv</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cv</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/0fe5a042-c92c-4740-ab7a-c7a96e36285b.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Helen</given_name><surname>Hasan</surname><affiliations><institution><institution_name>University of Wollongong</institution_name><institution_id type="ror">https://ror.org/00jtmb277</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Henry</given_name><surname>Linger</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id></institution></affiliations></person_name></contributors><titles><title>Older Women Online: Engaged, Active and Independent</title></titles><jats:abstract abstract-type="long"><jats:p>Older women in our communities are becoming marginalised through their lack of technical awareness and capability. Digital applications now dominate the way governments, business, communities and even families interact with all of us. As respected elders of our society, women not only need access to services which support their wellbeing as they age, but also have an important role to play in passing on their knowledge and wisdom to new generations. Through digital exclusion, older women often relied on others, particularly their spouses, to transact online activities. As they become carers for their ageing spouse or are widowed, they need to learn to do this for themselves. An action research approach recorded responses of seniors to individualised computer-learning sessions. Our research shows that they can learn digital skills, and this is leading to greater independence and social wellbeing. Everyone benefits as our women elders become digitally included.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cw</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cw</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/ecd3e145-c9c2-4dbb-9e5c-09aefa3ca3db.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Asma</given_name><surname>Aleidi</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Daniel</given_name><surname>Chandran</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name></contributors><titles><title>The Influence of IT on Women’s Entrepreneurial Intention in the Saudi Context</title></titles><jats:abstract abstract-type="long"><jats:p>IT entrepreneurship is becoming an increasingly vital source for promoting socio-economic growth, innovation and job opportunities. Despite the increasing awareness of this importance, evidence indicates that women participation in entrepreneurship with a particular focus on technological entrepreneurship remains low. Furthermore, there has been minimal research about female entrepreneurship from a technological point of view. Our goal in this study is to propose a model that extends the theory of planned behavior by incorporating the technological factors into established entrepreneurial models. Investigating such factors is beneficial for motivating a new generation of women entrepreneurs in the IT context. In addition, it helps to provide a further understanding to IS researchers and practitioners.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cx</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cx</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/6841e3fa-b063-4741-bb61-6c545ea5aefe.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Trang</given_name><surname>Nguyen</surname><affiliations><institution><institution_name>National Cheng Kung University</institution_name><institution_id type="ror">https://ror.org/01b8kcc49</institution_id><institution_department>Institute of International Management</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jengchung Victor</given_name><surname>Chen</surname><affiliations><institution><institution_name>National Cheng Kung University</institution_name><institution_id type="ror">https://ror.org/01b8kcc49</institution_id><institution_department>Institute of International Management</institution_department></institution></affiliations></person_name></contributors><titles><title>What Drives Post Adoption Behavior in Virtual Traffic Community: The Role of Utilitarian and Hedonic Values</title></titles><jats:abstract abstract-type="long"><jats:p>This study examines how satisfied experience enhance continuance intention of travel and navigation mobile application through the perceived value. It is proposed that user satisfaction stems from both utilitarian and hedonic value. Using a sample of 241 respondents and structural equation modeling, this study confirms that all aspect of perceived quality (information, system, service) enhances the perceived functionality of the app, while the sociability is the main determinant of the enjoyment perception. Both utilitarian and hedonic value are crucial in driving satisfaction, and eventually continuance intention of the apps. The findings are translated into practical implications and revenues for future research.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cy</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cy</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/03edb35f-d699-464b-9e02-844e7b3e47be.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Scott</given_name><surname>Morton</surname><affiliations><institution><institution_name>Whitireia Community Polytechnic</institution_name><institution_department>School of Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Petrea</given_name><surname>Redmond</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Teacher Education and Early Childhood</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Peter</given_name><surname>Albion</surname><affiliations><institution><institution_name>University of Southern Queensland</institution_name><institution_id type="ror">https://ror.org/04sjbnx57</institution_id><institution_department>School of Teacher Education and Early Childhood</institution_department></institution></affiliations></person_name></contributors><titles><title>Factors discouraging participation of girls in ICT education</title></titles><jats:abstract abstract-type="long"><jats:p>Despite expanding ICT job opportunities, there has been a decrease in the proportion of girls entering into ICT study, and pursuing ICT careers. This paper explores factors that discourage participation of high school girls in ICT using a modified version of the conceptual framework based on the “STEMcell” model. The modified framework was used to create an online questionnaire which gathered data from girls and boys between the ages of 15 and 17 years studying at high school. Each section of the framework used selected questions based on perceptions and attitudes to gain an insight into whether girls would be more likely to participate in ICT. The findings indicated that boys, more than girls sought advice from their family members on their future career choices. The results also showed stereotypes are still alive in girls more than boys and that girls are unlikely to follow a career in ICT. Moreover, girls more than boys disagree about ICT becoming compulsory in high school. Current number of enrolments of girls in ICT at high school lags behind that of boys and, until changes are made, girls going into the ICT industry will be in the minority.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.cz</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.cz</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/cfeb2a4c-6898-4b12-a945-0047a191052e.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Jose</given_name><surname>Ortiz</surname><affiliations><institution><institution_name>University of Auckland</institution_name><institution_id type="ror">https://ror.org/03b94tp07</institution_id></institution></affiliations></person_name></contributors><titles><title>Rescuing the Media in Emerging Democracies through ICT</title></titles><jats:abstract abstract-type="long"><jats:p>Several studies have shown the efficiency and pitfalls of ICT for mediating collective communication during political upheavals. However, little literature exists on understanding how the diversity of content generated through ICT empowers a free press when traditional media channels fail to expose the truth and promote public debate. This research aims to broaden our understanding of how ICT facilitate the exposure and interpretation of conditions in government institutions that go against public moralities – interpretations with the potential to mobilise thousands of individuals to protest. We engaged in an in-depth qualitative research using data from the Twittersphere. We conducted our study in the context of a Guatemalan tragedy in which 41 girls living in a state care home lost their lives. Our contribution to the literature is the understanding of how ICT enables the collective construction of meaning powerful enough to mobilise thousands of individuals in protest.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.da</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.da</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/0d46b139-16f3-45df-8f5f-b3dfca045b8e.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Mike</given_name><surname>Seymour</surname><affiliations><institution><institution_name>University of Sydney</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id></institution></affiliations></person_name></contributors><titles><title>Artificial Intelligence Is No Match for Human Stupidity: Ethical Reflections on Avatars and Agents</title></titles><jats:abstract abstract-type="long"><jats:p>What should our ethical concerns be in a future with ‘Artificially Intelligent’ agents?</jats:p><jats:p>The zeitgeist of AI agents often envisions a future encompassing a hyper intelligent singularity. In this worldview, AI “monsters” appear very separate from us as, abstracted, ethically ungrounded omnipotent overlords. A world of superintelligences that have moved beyond our comprehension, with no ethical restraint.</jats:p><jats:p>In this polemic, I explore a different future. I discount the ‘Robopocalypse’ initially depicted in Science Fiction. Instead, I examine how realistic digital humans do pose a very real and different ethical dilemma, as we assume intelligence based on their appearance, leading to an abdication of responsibility.</jats:p><jats:p>I phenomenologically explore the future of realistic digital agents and avatars, and ask: what does this human-like form say about us? How will we judge ourselves when the computer, looks like us? I argue that the singularity is unlikely and thus the primary ethical concern is not some superhuman AI intelligence, but in how we, ourselves, treat these digital humans.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.db</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.db</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/c060c967-f3b8-4a15-9824-10cc7a9e2baa.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Misita</given_name><surname>Anwar</surname><affiliations><institution><institution_name>Universitas Negeri Makassar</institution_name><institution_id type="ror">https://ror.org/05fzw1z08</institution_id><institution_department>Faculty of Engineering</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Scott</given_name><surname>Bingley</surname><affiliations><institution><institution_name>Victoria University</institution_name><institution_id type="ror">https://ror.org/01rrz9s51</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Stephen</given_name><surname>Burgess</surname><affiliations><institution><institution_name>Victoria University</institution_name><institution_id type="ror">https://ror.org/01rrz9s51</institution_id></institution></affiliations></person_name></contributors><titles><title>Understanding ICT strategy of women small business owners in developing countries: Linking social media use, business strategy and well-being</title></titles><jats:abstract abstract-type="long"><jats:p>Micro and small businesses comprises more than 70-95% of all business globally, provide important contributions to social and economic development and have been at the forefront of job creation (OECD, 2017). The use of mobile internet technology such as social media by small businesses has been receiving much attention, particularly for its potential in reaching wider customer base. The research aims to explore the use of social media by women small business owners in relation to business strategies and objectives from human development perspective. In doing so, we are guided by the interrelating concept of personal value, business strategy and women entrepreneurships. This paper reports a preliminary result of the study based on three interviews with women small business owners. The findings show social media strategy are directed towards fulfilling business objective and at the same time achieving valued goals around family commitments and other social well-being.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dc</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dc</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/70a52b04-e2e7-443b-b58e-be6691147a4f.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Sojen</given_name><surname>Pradhan</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Susan</given_name><surname>Beetson</surname><affiliations><institution><institution_name>University of Queensland</institution_name><institution_id type="ror">https://ror.org/00rqy9422</institution_id><institution_department>Faculty of Engineering, Architecture and IT</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Cat</given_name><surname>Kutay</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and IT</institution_department></institution></affiliations></person_name></contributors><titles><title>Building Digital Entrepreneurial Platform through Local Community Activity and Digital Skills in Aboriginal Australia</title></titles><jats:abstract abstract-type="long"><jats:p>This research is situated in the Ngemba community which includes the township known as Brewarrina. It is located approximately 900 kms north west of Sydney and classified ‘Very Remote Australia’. Brewarrina’s recorded Aboriginal population in 2016 was 71.09% contrasted with the total Indigenous Australian population being 2.8%. The Australian Government have identified Brewarrina in the ‘Digital Divide’ category.</jats:p><jats:p>Closing the gap on socio-economic disadvantage and the digital divide is directly related to economic development and national priorities include Aboriginal peoples’ employment as an identified target under the banner of the 'Close the Gap' initiative. The Australian government stated the national broadband network (NBN) initiative and ICTs would assist in achieving such priorities. Despite such strategies and initiatives, direct action has yet to be realised. This raises opportunities for targeted networking interactions within and beyond community, offering innovative approaches to countering these priorities.</jats:p><jats:p>This research will implement and verify an innovative model that facilitates community digital entrepreneurship. The model proposes several practical applications, including community members' ability to promote community entrepreneurship and community members’ skills development.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dd</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dd</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/8c3e5629-f3e9-4054-b912-04abfbe24950.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Saeed Uz Zaman</given_name><surname>Khan</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sojen</given_name><surname>Pradhan</surname><affiliations><institution><institution_name>University of Technology Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Information, Systems and Modelling</institution_department></institution></affiliations></person_name></contributors><titles><title>Perceived Antecedents to The Success of Impact Sourcing in Bangladesh</title></titles><jats:abstract abstract-type="long"><jats:p>Impact sourcing (ImS) has been identified as an emergent component of Business Process Outsourcing (BPO) which relates to the practice of developing IT skills for marginalised communities. Also known as socially responsible outsourcing, the core element of ImS is to train and employ people from disadvantaged background in expediting socioeconomic development. While the positive influence of ImS has been significantly noticed in countries such as India, Kenya and Nepal, there has not been any appropriate initiatives noticed in one of the most promising nations, Bangladesh. With adequate IT and telecommunication foundation followed by strong governmental support, Bangladesh has the potential to flourish in ImS sector and make significant socioeconomic development for its people. This research in progress paper proposes a conceptual framework to understand the perceived antecedents for adopting ImS undertakings in Bangladesh and provide valuable insight to the government and researchers/practitioners for employing effective ICT based social development strategies.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.de</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.de</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/eb41f2a2-ffe5-472b-8582-d097e9d8f972.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Julian</given_name><surname>Marx</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Professional Communication in Electronic Media/Social Media</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Milad</given_name><surname>Mirbabaie</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Professional Communication in Electronic Media/Social Media</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Christian</given_name><surname>Ehnis</surname><affiliations><institution><institution_name>The University of Sydney</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Discipline of Business Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Sense-Giving Strategies of Media Organisations in Social Media Disaster Communication: Findings from Hurricane Harvey</title></titles><jats:abstract abstract-type="long"><jats:p>Media organisations are essential communication stakeholders in social media disaster communication during extreme events. They perform gatekeeper and amplification roles which are crucial for collective sense-making processes. In that capacity, media organisations distribute information through social media, use it as a source of information, and share such information across different channels. Yet, little is known about the role of media organisations on social media as supposed sense-givers to effectively support the creation of mutual sense. This study investigates the communication strategies of media organisations in extreme events. A Twitter dataset consisting of 9,414,463 postings was collected during Hurricane Harvey in 2017. Social network and content analysis methods were applied to identify media communication approaches. Three different sense-giving strategies could be identified: retweeting of local in-house outlets; bound amplification of messages of individual to the organisation associated journalists; and open message amplification.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.df</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.df</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/807bf381-d6ec-4c2d-b90c-4647524c367d.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Christian</given_name><surname>Meske</surname><affiliations><institution><institution_name>Freie Universität Berlin and Einstein Center Digital Future</institution_name><institution_department>Department of Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Ireti</given_name><surname>Amojo</surname><affiliations><institution><institution_name>Freie Universität Berlin and Einstein Center Digital Future</institution_name><institution_department>Department of Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Social Bots as Initiators of Human Interaction in Enterprise Social Networks</title></titles><jats:abstract abstract-type="long"><jats:p>Enterprise Social Networks (ESNs) are said to have the potential to significantly improve communication and collaboration between employees. However, utilization is still a problem in organizations, as participation is voluntary. Current research on Affordance theory in IS research suggests one reason being that users may not always recognize the opportunities for action and the potential outcome of the corresponding actualization. In our qualitative study in a medium-sized company, we investigate how experiencing offline networking with other ESN users will help to recognize online networking potentials, leading to an increased actualization of ESN affordances. In addition, we investigate the role of social bots (here: Lunch Roulette Bot), which provoke interaction by inviting users to meet other employees for lunch, therefore nudging users to experience certain actualizations like offline networking. We find that social bots can be more helpful than conventional one-to-many solicitations of the management and help increase human interaction in ESN.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dg</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dg</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/da3463fd-e58b-4fee-803d-f9c353b4d6be.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Milad</given_name><surname>Mirbabaie</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jennifer</given_name><surname>Fromm</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Simone</given_name><surname>Löppenberg</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Sophie</given_name><surname>Meinig</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Matthias</given_name><surname>Reuße</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name></contributors><titles><title>The Potential of Social Media Analytics for Improving Social Media Communication of Emergency Agencies</title></titles><jats:abstract abstract-type="long"><jats:p>A growing number of people use social media to seek information or coordinate relief activities in times of crisis. Thus, social media is increasingly deployed by emergency agencies as well to reach more people in crisis situations. However, the large amount of available data on social media could also be used by emergency agencies to understand how they are perceived by the public and to improve their communication. In this study, we examined the Twitter communication about the German emergency agency “Johanniter-Unfall-Hilfe” by conducting a frequency, sentiment, social network and content analysis. The results reveal that a right-wing political cluster politically instrumentalised an incident related to this agency. Furthermore, some individuals used social media to express criticism. It can be concluded that the use of social media analytics in the daily routine of emergency management professionals can be beneficial for improving their social media communication strategy.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dh</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dh</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/8e88eb26-c019-48dd-b082-bfb16719e8a0.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Kai</given_name><surname>Riemer</surname><affiliations><institution><institution_name>The University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Discipline of Business Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Laurence Lock</given_name><surname>Lee</surname><affiliations><institution><institution_name>SWOOP Analytics Pty Ltd</institution_name></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Cai</given_name><surname>Kjaer</surname><affiliations><institution><institution_name>SWOOP Analytics Pty Ltd</institution_name></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Annika</given_name><surname>Haeffner</surname><affiliations><institution><institution_name>Ulm University</institution_name><institution_id type="ror">https://ror.org/032000t02</institution_id></institution></affiliations></person_name></contributors><titles><title>Metrics selection for group type identification in Enterprise Social Network (ESN) analytics</title></titles><jats:abstract abstract-type="long"><jats:p>With the proliferation of Enterprise Social Networks (ESN) measurement of ESN activity becomes increasingly relevant. ESN analytics aims to develop metrics and models to measure and classify ESN user activity to support organisational goals and outcomes. In this paper we focus on a neglected area of ESN analytics, metrics for understanding activity in ESN groups. We engage in explorative research, utilising actual ESN meta data describing activity in 350 groups across three organisations, to identify a set of metrics that divides the group sample into distinct user types. By employing clustering techniques we derive a set of four group types: broadcast streams, information forums, communities of practice and project teams. For ESN analytics research we contribute a set of metrics and group types. For practice we envision a method that enables group managers to compare aspirations for their groups to embody a certain group type, with actual activity patterns.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.di</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.di</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/189b75fc-5823-4528-8f2f-bd781e5dc922.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Dharshani</given_name><surname>Chandrasekara</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>Faculty of Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Darshana</given_name><surname>Sedera</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>Faculty of Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>Exploring the Boundary Conditions of Social Influence for Social Media Research</title></titles><jats:abstract abstract-type="long"><jats:p>Along with the proliferation of social networking sites (SNS), people around the world have gained the ability to influence each other in terms of many aspects of lives may it be a political interest or a simple purchase decision. However, most of the SNS studies have employed social influence constructs that were established prior to the advent of SNS to understand the nature and impact of social influence. Even though the application of such theories for SNS has generated a wealth of knowledge, it is vital to acknowledge the necessity of a new perspective that is specific to the current context. Therefore, we conducted a review of 65 studies to explore which social influence constructs have been employed by previous SNS studies and introduced five boundary conditions that should be taken into consideration when employing social influence theory for future SNS studies.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dj</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dj</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/68efcdd3-77a3-420d-a95d-b9b219eb4630.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Althaqafi</given_name><surname>Turki</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>School of Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Susan</given_name><surname>Foster</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>School of Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Md Mahbubur</given_name><surname>Rahim</surname><affiliations><institution><institution_name>Monash University</institution_name><institution_id type="ror">https://ror.org/02bfwt286</institution_id><institution_department>School of Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>Public value creation using social media applications for the local government context: a pilot case study</title></titles><jats:abstract abstract-type="long"><jats:p>Social media applications are receiving growing attention from local government agencies as they have the potential to offer public values to those agencies as well as providing benefits to citizens by enhancing public engagement and innovating public services. Despite the growth in the literature on social media, there is still limited understanding on how public value is created through the use of various social media applications in local government context. To address this concern, we have developed a model to investigate public value creation using social media applications. The model is evaluated using a pilot case study at a large Saudi Arabian municipality. The model and empirical evidence together contribute towards establishing a theoretical foundation for research into the impact of social media applications for public value creation. In addition, council managers can learn useful lessons drawing on our findings on how best utilise social media applications for local government matters.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dk</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dk</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/1d18560f-c400-44a5-a442-bc6c76d2b303.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Joschka</given_name><surname>Hüllmann</surname><affiliations><institution><institution_name>University of Münster</institution_name><institution_id type="ror">https://ror.org/00pd74e08</institution_id><institution_department>Department of Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Tobias</given_name><surname>Kroll</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name></contributors><titles><title>The Impact of User Behaviours on the Socialisation Process in Enterprise Social Networks</title></titles><jats:abstract abstract-type="long"><jats:p>The success of teams in enterprise social networks (ESN) is of high importance in today’s project-based and digitised work environments. In this context, onboarding of new hires or allocated team members means the adoption of group characteristics and behaviours. Studies identified cohesion and trust as part of the socialisation process and found communication behaviours that facilitate socialisation. ESN not only enable efficient communication or relationship building, they also make the socialization processes visible and analysable. In this paper, we propose to use metrics from social network analysis (e.g. extraversion, openness and proactiveness) to operationalise communication behaviours identified as positive for socialisation. First evaluations with two ESN data sets in OLS, beta regression and multilevel models sparsely support the influence on closeness, which we expect to reflect the level of group integration.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dl</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dl</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/a921a32e-3b41-4c96-9eb3-6eee69b3eff4.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Tobias</given_name><surname>Kroll</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Lea-Marie</given_name><surname>Braun</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Stefan</given_name><surname>Stieglitz</surname><affiliations><institution><institution_name>University of Duisburg-Essen</institution_name><institution_id type="ror">https://ror.org/04mz5ra38</institution_id><institution_department>Department of Computer Science and Applied Cognitive Science</institution_department></institution></affiliations></person_name></contributors><titles><title>Accommodated Emoji Usage: Influence of Hierarchy on the Adaption of Pictogram Usage in Instant Messaging</title></titles><jats:abstract abstract-type="long"><jats:p>Communication Accommodation Theory predicts to what extent individuals accommodate their verbal and nonverbal behaviour by converging it towards their conversation partner or diverging it away from them to gain social approval and to decrease social distance. Especially individuals in lower hierarchy positions accommodate their communication behaviour towards individuals in higher hierarchy positions. Nowadays, computer- and smartphone-mediated communication are common ways to communicate, for example via instant messaging. However, instant messenger lack in transporting nonverbal cues. To fill this gap, emoji are used increasingly. A study was conducted to examine how individuals in lower hierarchy positions converge their emoji usage towards individuals in higher hierarchy position. The results support the assumption that the higher hierarchy is perceived, the more emoji accommodation is shown.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dm</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dm</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/d0c9729c-a3a1-4db8-b256-bef664d1d12f.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Natalie</given_name><surname>Hardwicke</surname><affiliations><institution><institution_name>The University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Discipline of Business Information Systems</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kai</given_name><surname>Riemer</surname><affiliations><institution><institution_name>The University of Sydney Business School</institution_name><institution_id type="ror">https://ror.org/0384j8v12</institution_id><institution_department>Discipline of Business Information Systems</institution_department></institution></affiliations></person_name></contributors><titles><title>Do You Understand Our Understanding? Personas as Hermeneutic Tools in Social Technology Projects</title></titles><jats:abstract abstract-type="long"><jats:p>Personas, prevalent in information systems design and implementation, are often positioned as aesthetic creations imitating technology “end users”. As such, there is an inherent assumption that end user outcomes can be known prior to technology usage in practice. This assumption, however, becomes problematic in malleable end user software (MEUS) contexts, in which concrete usage is unknowable a priori. Through an auto-ethnographic account of a unique case of a small consultancy, the Ripple Effect Group, attuned to the nature of MEUS, we explore a novel approach to personas in social technology projects. We turn to the work of Gadamer (1975) to outline two distinct views of “mimesis” for contrasting the dominant portrayal of personas in the literature compared to our empirical context. Our paper challenges conventional thinking surrounding personas, and offers a practical approach, and preliminary theorizing, for personas as hermeneutic tools to convey meaning for those involved in MEUS projects.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2018</year></publication_date><doi_data><doi>10.5130/acis2018.dn</doi><resource>https://uplopen.com/chapters/e/10.5130/acis2018.dn</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://uplopen.com/books/9683/files/efd77cc3-b30e-4d61-8279-dd49be5ba105.pdf</resource></item></collection></doi_data></content_item></book></body></doi_batch>