Journal title
ISSN: 1449-8618    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 23 Year 2019

32 articles in this issue 

Janine Viol Hacker,Michael Johnson,Carol Saunders,Amanda L. Thayer

Organizations have increasingly turned to the use of virtual teams (VTs) to tackle the complex nature of today’s organizational issues. To address these practical needs, VTs researchers from different disciplines have begun to amass a large literature. Ho... see more

 

Judy Watson,David Lacey,Don Kerr,Paul Salmon,Natassia Goode

An increasing number of older adults are being affected by scams that can lead to the compromise and misuse of their personal details. Previous research has investigated factors that increase the likelihood of falling victim to identity compromise and mis... see more

 

Suprika Vasudeva Shrivastava,Urvashi Rathod

Software companies are now using Distributed Agile Development (DAD) in order to create high quality solutions, which aligns with the business priorities of lesser time and cost. Although, DAD is beneficial, there are significant risks involved in such pr... see more

 

Max M. North,Sarah M North

As the speed of technical and scientific innovation accelerates past the speed at which humans can learn, the need for innovative pedagogical environments and techniques, such as immersive visualization environments, becomes essential and apparent. The pr... see more

 

Sean Hinton,Lincoln C. Wood,Harminder Singh,Torsten Reiners

A recent innovation in employee motivation systems is the introduction of ‘gamification’, which refers to the use of game design mechanics and principles to influence behaviour to enhance staff motivation and engagement. Enterprise gamification systems ag... see more

 

Vinh Nguyen Xuan Truong,Mathews Nkhoma,Wanniwat Pansuwong

Advertising in mobile apps has recently become one of the most popular advertising channels for businesses when its annual revenue has rapidly increased year over year. On this kind of advertising, the app publishers do not only play a critical role in th... see more

 

Matthew Warren,Oliver Burmeister

This is the second special section on applied ethics for AJIS. As was the case for the first special section on ethics, of the various submissions, only three have been accepted for publication. This is not an indication that little work is being done in ... see more

 

Seumas Miller

Recent revelations concerning data firm Cambridge Analytica’s illegitimate use of the data of millions of Facebook users highlights the ethical and, relatedly, legal issues arising from the use of machine learning techniques. Cambridge Analytica is, or wa... see more

 

Morgan Luck

Internal cyber-attacks (cyber-attacks which occur from within an organization) pose a serious threat to an organization’s security. One tool that organizations can employ to help them detect such threats is the internal cyber-sting. An internal cyber-stin... see more

 

Georg Thomas,Oliver Burmeister,Gregory Low

Across the globe, there has been a noticeable increase in the adoption of breach disclosure laws that are designed to protect the privacy of individuals. To validate the security controls implemented by an organisation to protect sensitive data, penetrati... see more

 

Shah Miah,Jun Shen,John W Lamp,Don Kerr,John Gammack

This paper presents a contemporary literature review to provide insights into the current health informatics literature. The objective of this study is to identify emerging directions of current health informatics research from the latest and existing stu... see more

 

Elena Vlahu-Gjorgievska,Swetha Nagapuri,Khin Than Win

Telehealth interventions are designed to facilitate the remote exchange of information and data between patients and health care providers, improving the quality and safety of the patients and increasing efficiency and cost-effectiveness of health care pr... see more

 

Nadia Ghandour,Ahmad Ghandour

Personally Controlled Health Records (PCHR) are patient-centric tools which allow individuals to own, manage, access and share their health information online from anywhere, at any time. Patient-centric tools have received considerable interest and invest... see more

 

Oliver Kisalay Burmeister,David Ritchie,Alison Devitt,Eevon Chia,Gregory Dresser,Russell Roberts

The aim of the project was to evaluate the use of telehealth equipment in the homes of older community-dwelling people, and to review its social and economic impact. A mixed methods approach was adopted, involving interviews, observation and Depression An... see more

 

Adam Poulsen,Oliver K Burmeister

A rising elderly population and diminishing number of family and professional carers has led to calls for the intervention of care robots. This leaves the quality of robot-delivered care to be determined by designers, for profit companies, nursing codes o... see more

 

Emmanuel Eze,Rob Gleasure,Ciara Heavin

Shortages of health workers, infrastructural deficiencies, limited access to medical care are just a few of the many barriers to care in developing countries. The integration of smartphones and mobile devices into healthcare systems has been proposed to a... see more

 

Md Rafiqul Islam,Shah Jahan Miah,Abu Raihan M. Kamal,Oliver Burmeister

Mental health is an important determinant of communities’ well-being, influenced not only by individual attributes, but also by social and organisational environments in which people work and live. Despite studies examining mental health status among spec... see more

 

Pratyush Banerjee,Ritu Gupta

Talent attraction is one of the major challenges for HR managers. With the rise of online recruitment channels, the number of applicants for a given job vacancy have increased substantially. In addition, the time taken in finding the right talent from the... see more

 

Farheen Fathima Shaik,Upam Pushpak Makhecha

Global Virtual Teams (GVTs) comprise geographically distributed groups of people collaborating with each other through technology-mediated communication. Members of GVTs are from different cultural backgrounds and time zones, who may (or may not) meet in ... see more

 

Upasna A Agarwal

Drawing from Conservation of Resources Theory (COR), the purpose of this paper is to examine the impact of supervisor’s perceived communication style (passive, aggressive, and assertive styles) on subordinates PsyCap and cyberloafing. The study also tests... see more

 

Gunjan Tomer,Sushanta Kumar Mishra

Technology is an integral part of the work life of any information technology (IT) professional. However, the influence of technology on career related outcomes of IT professionals is at best limited. Using the P-E fit perspective, the present study inves... see more

 

Duy Dang-Pham,Karlheinz Kautz,Siddhi Pittayachawan,Vince Bruno

Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees’ perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior st... see more

 

Geetha Kanaparan,Rowena Cullen,David Mason

High failure rates appear to be a norm in introductory programming courses. Many solutions have been proposed to improve the high failure rates. Surprisingly, these solutions have not lead to significant improvements in the performance of students in intr... see more

 

Sander Paul Zwanenburg,Israr Qureshi

Researchers’ ability to draw inferences from their empirical work hinges on the degree of measurement error. The literature in Information Systems and other behavioural disciplines describes a plethora of sources of error. While it helps researchers deal ... see more

 

John R Venable,Jan vom Brocke,Robert Winter

Design Science Research (DSR) has many risks. Researchers inexperienced in DSR, especially early career researchers (ECRs) and research students (e.g. PhD students) risk inefficient projects (with delays, rework, etc.) at best and research project failure... see more

 

Sebastian K. Boell,Dirk S. Hovorka

The predominant means by which research becomes visible and accessible to the research community is through publication. Generally, publication requires careful framing of the research in relation to existing knowledge. As a contribution to knowledge cann... see more

 

Weng Marc Lim,Ai Ling Lim,Cynthia Su Chen Phang

This paper describes perceptions of social media as a communication tool and source of information for non-profit activities in non-urban communities. It proposes a conceptual framework predicated on the unified theory of acceptance and use of technology ... see more

 

Maria Prokofieva,Shah J Miah

Blockchain is treated as a ledger system that manages data and their transactions using time-stamped blocks through cryptography and works in a decentralised manner over the computing network. Although blockchain is originally used as a backbone for the c... see more

 

Darshana Sedera,Maura Atapattu

Information systems (IS) studies regularly assume linearity of the variables and often disregard the potential non-linear theoretical interrelationships among the variables. The application of polynomial regression and response surface methodology can obs... see more