{"title":"What prevents organisations from achieving e-HRM potential?","authors":"Arnela Ceric, Kevin Parton","doi":"10.3127/ajis.v28.3877","DOIUrl":"https://doi.org/10.3127/ajis.v28.3877","url":null,"abstract":"Use of electronic human resource management (e-HRM) offers the prospect of enabling the human resource management (HRM) function to take on a strategic partner’s role in organisations. Despite the pervasive expansion of e-HRM use, there is no clear understanding of why organisations are not achieving e-HRM potential. We address this issue by investigating e-HRM adoption factors and their influence on information technology (IT) use potential to automate, informate and transform the HRM function in a sequential manner. In particular, we examine HRM professionals’ experiences with e-HRM use, including challenges, successes, and outcomes. We identified e-HRM adoption factors that enable and that constrain each stage of e-HRM use. With a focus on the inhibiting factors, our findings suggest that e-HRM potential hindered already in the automation stage diminishes e-HRM potential to subsequently informate and to transform the e-HRM function.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"43 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140488933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework","authors":"Jia Xu, Humza Naseer, S. Maynard, Justin Filippou","doi":"10.3127/ajis.v28.4215","DOIUrl":"https://doi.org/10.3127/ajis.v28.4215","url":null,"abstract":"Organisations are increasingly practising business analytics to generate actionable insights that can guide their digital business transformation. Transforming business digitally using business analytics is an ongoing process that requires an integrated and disciplined approach to leveraging analytics and promoting collaboration. An emerging business analytics practice, Data Operations (DataOps), provides a disciplined approach for organisations to collaborate using analytical information for digital business transformation. We propose a conceptual framework by reviewing the literature on business analytics, DataOps and organisational information processing theory (OIPT). This conceptual framework explains how organisations can employ DataOps as an integrated and disciplined approach for developing the analytical information processing capability and facilitating boundary-spanning activities required for digital business transformation. This research (a) extends current knowledge on digital transformation by linking it with business analytics from the perspective of OIPT and boundary-spanning activities, and (b) presents DataOps as a novel approach for using analytical information for digital business transformation.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"43 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140489865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Identity Protection: The Moderation Role of Self-Efficacy","authors":"Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliveira","doi":"10.3127/ajis.v28.4397","DOIUrl":"https://doi.org/10.3127/ajis.v28.4397","url":null,"abstract":"The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting identity in a mobile environment is a problem. This study develops a model that examines the role of identity protection self-efficacy in increasing users’ motivation intentions to achieve actual mobile identity protection. Our research found that self-efficacy significantly affects the relationship between users’ perceived threat appraisal and their motivational intentions for identity protection. The relation between mobile users’ protection, motivational intentions, and actual mobile identity protection actions was also found to be significant. Additionally, the findings revealed the considerable impact of awareness in fully mediating between self-efficacy and actual identity protection. The model and its hypotheses are empirically tested through a survey of 383 mobile users, and the findings are validated through a panel of experts, thus confirming the impact of self-efficacy on an individual’s identity protection in the mobile context.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"35 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140489387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doing Big Things in a Small Way: A Social Media Analytics Approach to Information Diffusion During Crisis Events in Digital Influencer Networks","authors":"Shohil Kishore, Amy Errmann","doi":"10.3127/ajis.v28.4429","DOIUrl":"https://doi.org/10.3127/ajis.v28.4429","url":null,"abstract":"Digital influencers play an essential role in determining information diffusion during crisis events. This paper demonstrates that information diffusion (retweets) on the social media platform Twitter (now X) highly depends on digital influencers’ number of followers and influencers’ location within communication networks. We show (study 1) that there is significantly more information diffusion in regional (vs. national or international) crisis events when tweeted by micro-influencers (vs. meso- and macro-influencers). Further, study 2 demonstrates that this pattern holds when micro-influencers operate in a local location (are located local to the crisis). However, effects become attenuated when micro-influencers are situated in a global location (outside of the locality of the event). We term this effect ‘influencer network compression’ – the smaller in scope a crisis event geography (regional, national, or international) and influencer location (local or global) becomes, the more effective micro-influencers are at diffusing information. This shows that those who possess the most followers (meso- and macro-influencers) are less effective at attracting retweets than micro-influencers situated local to a crisis. As online information diffusion plays a critical role during public crisis events, this paper contributes to both practice and theory by exploring the role of digital influencers and their network geographies in different types of crisis events.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140491722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors affecting prosocial sharing health-related information on social media during a health crisis: A dual exchanging-protecting model","authors":"Long Hoang Le, Ai-Phuong Hoang, Cong Hiep Pham","doi":"10.3127/ajis.v27i0.4349","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4349","url":null,"abstract":"During a health crisis, prosocial sharing of health-related information (HRI) on social media can help deliver early warnings about new diseases, raise social awareness, exchange support, and spread health policies. Current literature has mainly focused on the factors of general sharing of HRI under normal conditions but neglected those motivations under the health crisis context. This study aims to investigate factors that influence prosocial sharing of HRI on social media during a health crisis. To obtain the objective, this study proposes a dual exchanging-protecting model derived from the fear appeal model and social exchange theory. A partial least squares analysis, carried out on surveyed data of 326 participants, suggested that online users performed two steps of threat appraisal and coping appraisal when they share HRI on social media. Specifically, both health and information risks were found to have impacts on prosocial sharing via motivational factors. Additionally, the motivations of prosocial sharing include both protecting factors (i.e., sharing efficacy, response efficacy) and an exchanging factor (i.e., reciprocity expectation). Our findings offer several theoretical implications and practical contributions for health communicators.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139230032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A configurational view on technology acceptance: the example of highly integrated collaboration platforms","authors":"C. Kopplin","doi":"10.3127/ajis.v27i0.4043","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4043","url":null,"abstract":"Highly integrated software environments for various routine and non-routine tasks promise productivity gains for organizations. To fulfill this promise, users need to be willing to employ the new technology. A combined perspective of sufficient and necessary conditions in the form of fuzzy-set qualitative comparative analysis (fsQCA) and, necessary condition analysis (NCA) is used to examine the technology acceptance of workstream collaboration tools, advancing examinations from a multivariate perspective to a more holistic view. One hundred thirty participants were trained in the software application Slack for three months. Following the training period, configurational analysis using fsQCA and NCA based on a unified theory of acceptance and use of technology (UTAUT) framework was conducted based on 116 qualified questionnaires. Necessity assessment shows that all influence factors exhibit necessity properties, with facilitating conditions and effort expectancy most substantially constraining an individual’s intention to use. Sufficiency evaluation confirms UTAUT’s variable choice and identifies social influence as a key condition that enables intention to use. Segmentation according to gender further reveals that effort expectancy and facilitating conditions are necessary conditions for female users but not for males.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"354 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139228326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hannes Fischer, Martin Wiener, Susanne Strahringer, Julia Kotlarsky, Katja Bley
{"title":"Data-Driven Organizations: Review, Conceptual Framework, and Empirical Illustration","authors":"Hannes Fischer, Martin Wiener, Susanne Strahringer, Julia Kotlarsky, Katja Bley","doi":"10.3127/ajis.v27i0.4425","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4425","url":null,"abstract":"With companies and other organizations increasingly striving to become (more) data-driven, there has been growing research interest in the notion of a data-driven organization (DDO). In existing literature, however, different understandings of such an organization emerged. The study at hand sets forth to synthesize the fragmented body of research through a review of existing DDO definitions and implicit understandings of this concept in the information systems and related literatures. Based on the review results and drawing on the established concept of the “knowing organization,” our study identifies five core dimensions of a DDO—namely, data sourcing & sensemaking, data capabilities, data-driven culture, data-driven decision-making, and data-driven value creation—which we integrate into a conceptual DDO framework. Most notably, the proposed framework suggests that—like its predecessor, the knowing organization—a DDO may draw on an outside-in view; however, it may also draw on an inside-out view, or even combine the two views, thereby setting itself apart from the knowing organization. To illustrate our conceptual DDO framework and demonstrate its usefulness, we apply this framework to three empirical examples. Theoretical and practical contributions as well as directions for future research are discussed.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139229591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Weerasinghe, David Pauleen, Nazim Taskin, Shane Scahill
{"title":"Alignment of Big Data Perceptions Across Levels in Healthcare: The case of New Zealand","authors":"K. Weerasinghe, David Pauleen, Nazim Taskin, Shane Scahill","doi":"10.3127/ajis.v27i0.4067","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4067","url":null,"abstract":"Big data and related technologies have the potential to transform healthcare sectors by facilitating improvements to healthcare planning and delivery. Big data research highlights the importance of aligning big data implementations with business needs to achieve success. In one of the first studies to examine the influence of big data on business-IT alignment in the healthcare sector, this paper addresses the question: how do stakeholders’ perceptions of big data influence alignment between big data technologies and healthcare sector needs across macro, meso, and micro levels in the New Zealand (NZ) healthcare sector? A qualitative inquiry was conducted using semi-structured interviews to understand perceptions of big data across the NZ healthcare sector. An application of a novel theory, Theory of Sociotechnical Representations (TSR), is used to examine people’s perceptions of big data technologies and their applicability in their day-to-day work. These representations are analysed at each level and then across levels to evaluate the degree of alignment. A social dimension lens to alignment was used to explore mutual understanding of big data across the sector. The findings show alignment across the sector through the shared understanding of the importance of data quality, the increasing challenges of privacy and security, and the importance of utilising modern and new data in measuring health outcomes. Areas of misalignment include the differing definitions of big data, as well as perceptions around data ownership, data sharing, use of patient-generated data and interoperability. Both practical and theoretical contributions of the study are discussed.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139234032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do Challenge and Hindrance Stressors Effect Cyberloafing Differently? Attentiveness and Anger as Mediators and Trait Mindfulness as a Moderator","authors":"Sauvik Kumar Batabyal, K. Bhal","doi":"10.3127/ajis.v27i0.4105","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4105","url":null,"abstract":"The objective of this study is to test the differential effect of challenge and hindrance stressors on cyberloafing, specifically using attentiveness and anger as mediators, respectively. It also investigates the effect of trait mindfulness as a moderator on the effect of hindrance stressors on cyberloafing through anger. We collected data from 304 full-time Indian employees, working in broad-ranging industries and functions. The findings showed that challenge stressors have an indirect negative effect on cyberloafing through attentiveness. The results also indicated that anger partially mediates the positive relationship between hindrance stressors and cyberloafing. Simple moderation analysis revealed that high trait mindfulness lowers the impact of hindrance stressors on anger. Moreover, trait mindfulness moderated the indirect effect of hindrance stressors on cyberloafing through anger, in a way that the indirect effect became weaker in the case of high trait mindfulness. To regulate cyberloafing, we discussed the importance of optimizing challenge stressors to increase attentiveness and enhancing trait mindfulness to weaken the negative effects of hindrance stressors on anger and cyberloafing in the context of the theoretical and practical contribution of the study.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124442062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Agility Meets a Project Portfolio: A Study of Success Factors in Large Organisations","authors":"M. Aghajani, K. Ahsan, Naomi Whiteside","doi":"10.3127/ajis.v27i0.4113","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4113","url":null,"abstract":"The iterative nature of agile methods combined with high levels of team and customer interactions and continuously changing IT and software development project requirements make the management of agile project portfolios very complex. To date, the mechanisms under which project portfolio management adapts to these complexities and achieves portfolio success have not been thoroughly investigated. This study explores the notion of success and its impacting factors in large organisations' portfolios of agile IT and software development projects. Using a multiple case study design, we analysed the agile project portfolios of seven large organisations. We identified four success criteria and 15 success factors and categorised them into a unique agile portfolio success framework. Some of these criteria and factors are unique to agile project portfolios. The framework contributes to agile and project management literature by conceptualising the notion of success in portfolios of agile projects while revealing a set of factors that affect the relationship between an agile portfolio with its subcomponents and the surrounding environment. The framework supports managers and practitioners in large organisations in reflecting on their agility efforts to achieve higher success rates in their agile portfolios.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131218633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}