32 articles in this issue
Janine Viol Hacker,Michael Johnson,Carol Saunders,Amanda L. Thayer
Organizations have increasingly turned to the use of virtual teams (VTs) to tackle the complex nature of today’s organizational issues. To address these practical needs, VTs researchers from different disciplines have begun to amass a large literature. Ho... see more
Judy Watson,David Lacey,Don Kerr,Paul Salmon,Natassia Goode
An increasing number of older adults are being affected by scams that can lead to the compromise and misuse of their personal details. Previous research has investigated factors that increase the likelihood of falling victim to identity compromise and mis... see more
Suprika Vasudeva Shrivastava,Urvashi Rathod
Software companies are now using Distributed Agile Development (DAD) in order to create high quality solutions, which aligns with the business priorities of lesser time and cost. Although, DAD is beneficial, there are significant risks involved in such pr... see more
Max M. North,Sarah M North
As the speed of technical and scientific innovation accelerates past the speed at which humans can learn, the need for innovative pedagogical environments and techniques, such as immersive visualization environments, becomes essential and apparent. The pr... see more
Sean Hinton,Lincoln C. Wood,Harminder Singh,Torsten Reiners
A recent innovation in employee motivation systems is the introduction of ‘gamification’, which refers to the use of game design mechanics and principles to influence behaviour to enhance staff motivation and engagement. Enterprise gamification systems ag... see more
Vinh Nguyen Xuan Truong,Mathews Nkhoma,Wanniwat Pansuwong
Advertising in mobile apps has recently become one of the most popular advertising channels for businesses when its annual revenue has rapidly increased year over year. On this kind of advertising, the app publishers do not only play a critical role in th... see more
Matthew Warren,Oliver Burmeister
This is the second special section on applied ethics for AJIS. As was the case for the first special section on ethics, of the various submissions, only three have been accepted for publication. This is not an indication that little work is being done in ... see more
Seumas Miller
Recent revelations concerning data firm Cambridge Analytica’s illegitimate use of the data of millions of Facebook users highlights the ethical and, relatedly, legal issues arising from the use of machine learning techniques. Cambridge Analytica is, or wa... see more
Morgan Luck
Internal cyber-attacks (cyber-attacks which occur from within an organization) pose a serious threat to an organization’s security. One tool that organizations can employ to help them detect such threats is the internal cyber-sting. An internal cyber-stin... see more
Georg Thomas,Oliver Burmeister,Gregory Low
Across the globe, there has been a noticeable increase in the adoption of breach disclosure laws that are designed to protect the privacy of individuals. To validate the security controls implemented by an organisation to protect sensitive data, penetrati... see more
Shah Miah,Jun Shen,John W Lamp,Don Kerr,John Gammack
This paper presents a contemporary literature review to provide insights into the current health informatics literature. The objective of this study is to identify emerging directions of current health informatics research from the latest and existing stu... see more
Elena Vlahu-Gjorgievska,Swetha Nagapuri,Khin Than Win
Telehealth interventions are designed to facilitate the remote exchange of information and data between patients and health care providers, improving the quality and safety of the patients and increasing efficiency and cost-effectiveness of health care pr... see more
Nadia Ghandour,Ahmad Ghandour
Personally Controlled Health Records (PCHR) are patient-centric tools which allow individuals to own, manage, access and share their health information online from anywhere, at any time. Patient-centric tools have received considerable interest and invest... see more
Oliver Kisalay Burmeister,David Ritchie,Alison Devitt,Eevon Chia,Gregory Dresser,Russell Roberts
The aim of the project was to evaluate the use of telehealth equipment in the homes of older community-dwelling people, and to review its social and economic impact. A mixed methods approach was adopted, involving interviews, observation and Depression An... see more
Adam Poulsen,Oliver K Burmeister
A rising elderly population and diminishing number of family and professional carers has led to calls for the intervention of care robots. This leaves the quality of robot-delivered care to be determined by designers, for profit companies, nursing codes o... see more
Emmanuel Eze,Rob Gleasure,Ciara Heavin
Shortages of health workers, infrastructural deficiencies, limited access to medical care are just a few of the many barriers to care in developing countries. The integration of smartphones and mobile devices into healthcare systems has been proposed to a... see more
Md Rafiqul Islam,Shah Jahan Miah,Abu Raihan M. Kamal,Oliver Burmeister
Mental health is an important determinant of communities’ well-being, influenced not only by individual attributes, but also by social and organisational environments in which people work and live. Despite studies examining mental health status among spec... see more
Manish Gupta,Jatin Pandey,Jighyasu Gaur,Neharika Vohra
Preface to Research on Role of Technology in Workforce Management
Pratyush Banerjee,Ritu Gupta
Talent attraction is one of the major challenges for HR managers. With the rise of online recruitment channels, the number of applicants for a given job vacancy have increased substantially. In addition, the time taken in finding the right talent from the... see more
Farheen Fathima Shaik,Upam Pushpak Makhecha
Global Virtual Teams (GVTs) comprise geographically distributed groups of people collaborating with each other through technology-mediated communication. Members of GVTs are from different cultural backgrounds and time zones, who may (or may not) meet in ... see more
Upasna A Agarwal
Drawing from Conservation of Resources Theory (COR), the purpose of this paper is to examine the impact of supervisor’s perceived communication style (passive, aggressive, and assertive styles) on subordinates PsyCap and cyberloafing. The study also tests... see more
Gunjan Tomer,Sushanta Kumar Mishra
Technology is an integral part of the work life of any information technology (IT) professional. However, the influence of technology on career related outcomes of IT professionals is at best limited. Using the P-E fit perspective, the present study inves... see more
Marta Indulska,Virpi Kristiina Tuunainen,Kai Riemer
Preface to the Special Section of Selected Papers from the 28th Australasian Conference on Information Systems
Duy Dang-Pham,Karlheinz Kautz,Siddhi Pittayachawan,Vince Bruno
Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees’ perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior st... see more
Geetha Kanaparan,Rowena Cullen,David Mason
High failure rates appear to be a norm in introductory programming courses. Many solutions have been proposed to improve the high failure rates. Surprisingly, these solutions have not lead to significant improvements in the performance of students in intr... see more
Sander Paul Zwanenburg,Israr Qureshi
Researchers’ ability to draw inferences from their empirical work hinges on the degree of measurement error. The literature in Information Systems and other behavioural disciplines describes a plethora of sources of error. While it helps researchers deal ... see more
John R Venable,Jan vom Brocke,Robert Winter
Design Science Research (DSR) has many risks. Researchers inexperienced in DSR, especially early career researchers (ECRs) and research students (e.g. PhD students) risk inefficient projects (with delays, rework, etc.) at best and research project failure... see more
Sebastian K. Boell,Dirk S. Hovorka
The predominant means by which research becomes visible and accessible to the research community is through publication. Generally, publication requires careful framing of the research in relation to existing knowledge. As a contribution to knowledge cann... see more
Weng Marc Lim,Ai Ling Lim,Cynthia Su Chen Phang
This paper describes perceptions of social media as a communication tool and source of information for non-profit activities in non-urban communities. It proposes a conceptual framework predicated on the unified theory of acceptance and use of technology ... see more
Maria Prokofieva,Shah J Miah
Blockchain is treated as a ledger system that manages data and their transactions using time-stamped blocks through cryptography and works in a decentralised manner over the computing network. Although blockchain is originally used as a backbone for the c... see more
Darshana Sedera,Maura Atapattu
Information systems (IS) studies regularly assume linearity of the variables and often disregard the potential non-linear theoretical interrelationships among the variables. The application of polynomial regression and response surface methodology can obs... see more
Adam Poulsen,Anwaar Ulhaq,Shah Miah
A short post publication review of a recent AJIS paper.