{"title":"The Investigator's Dilemma - A Review of Social Media Analytics Research Ethics in Information Systems","authors":"Julian Marx, Milad Mirbabaie","doi":"10.3127/ajis.v26i0.3287","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3287","url":null,"abstract":"Social media have become not only integral parts of our private and professional lives, but also an indispensable source of data for empirical research across a variety of academic disciplines. Applying a Social Media Analytics (SMA) methodology, however, imposes heavy ethical challenges on researchers. Scholars in the Information Systems (IS) discipline must deal with a patchwork of ethical frameworks, regulations, and (missing) institutional support. To initiate a debate on how to develop a common understanding of SMA research ethics, this paper compiles a scoping review of extant literature and suggests a research agenda for IS scholarship on this matter. The review yields a total of eight fundamental principles of ethical SMA research, which provide a starting point to guiding individual researchers towards more ethical conduct. At the same time, this work unearths a multitude of intricate dilemmas that are currently unresolved. The findings of this review will encourage IS scholarship to find its own voice in the debate about social media research ethics.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kathrin Eismann, Diana Fischer-Preßler, K. Fischbach
{"title":"Applied Ethics and Digital Information Privacy: Informing the Design of Covid-19 Contact Tracing Apps","authors":"Kathrin Eismann, Diana Fischer-Preßler, K. Fischbach","doi":"10.3127/ajis.v26i0.3097","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3097","url":null,"abstract":"To counteract the spread of Covid-19, many countries have introduced mobile applications for contact tracing, which raises considerable questions about how these apps protect users’ information privacy. Through an exploratory analysis of Covid-19 contact tracing apps being used in Australia, France, Germany, Japan, and New Zealand, we identify normative and technical principles for the design of privacy-sensitive contact tracing apps. Based on a Restricted Access/Limited Control (RALC) account of information privacy, we discuss how the apps protect users’ information privacy through limiting access to and allowing users to actively manage their personal information. Our findings illustrate what understanding of information privacy is evident from the various designs of Covid-19 contact tracing apps, and how competing design principles can contribute to users’ information privacy. From a practical perspective, our findings can inform the design of contact tracing apps and the development of privacy approaches that can be applied in particular contexts. Our work thus bridges the gap between ethical design guidelines and technical analyses of specific implementations.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial for the Special Section on Research on Applied Ethics: Developing Ethical Guidelines for Social Media Analytics","authors":"D. Bunker, S. Knight, Stefan Stieglitz","doi":"10.3127/ajis.v26i0.4063","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.4063","url":null,"abstract":"","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy","authors":"Franck Soh, Kane J. Smith, G. Dhillon","doi":"10.3127/ajis.v26i0.3367","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3367","url":null,"abstract":"The rise of social media raises important ethical issues regarding social media user behaviors. This study seeks to investigate the determinants of social media addiction by focusing on social capital and privacy self-efficacy. We argue that social capital has a mixed association with social media addiction by highlighting the difference between social capital bonding and social capital bridging. Notably, social media users differ in their usage purposes; as some build more bridges, others focus on bonding. Moreover, we posit that the relationship between social capital and social media addiction is moderated by social media user privacy self-efficacy. We collected the data using a survey approach and the data was analyzed using covariance-based structural equation modeling. The findings support our hypotheses. First, we found that social media users with high bridging experience lesser social media addiction. Those with high bonding have more social media addiction. Second, social media users' privacy self-efficacy moderates the relationship between social capital and social media addiction. This occurs by reinforcing the negative association between social capital bridging and social media addiction and the positive association between social capital bonding and social media addiction. Our findings provide important theoretical contributions and implications for practice.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"17 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anna-Katharina Jung, Sünje Clausen, A. S. Franzke, Julian Marx
{"title":"'Cambridge Moralica' - Towards an Ethical Framework for Social Media Analytics","authors":"Anna-Katharina Jung, Sünje Clausen, A. S. Franzke, Julian Marx","doi":"10.3127/ajis.v26i0.3121","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3121","url":null,"abstract":"En route to the unravelling of today’s multiplicity of societal challenges, making sense of social data has become a crucial endeavour in Information Systems (IS) research. In this context, Social Media Analytics (SMA) has evolved to a promising field of data-driven approaches, guiding researchers in the process of collecting, analysing, and visualising social media data. However, the handling of such sensitive data requires careful ethical considerations to protect data subjects, online communities, and researchers. Hitherto, the field lacks consensus on how to safeguard ethical conduct throughout the research process. To address this shortcoming, this study proposes an extended version of a SMA framework by incorporating ethical reflection phases as an addition to methodical steps. Following a design science approach, existing ethics guidelines and expert interviews with SMA researchers and ethicists serve as the basis for redesigning the framework. It was eventually assessed through multiple rounds of evaluation in the form of focus group discussions and questionnaires with ethics board members and SMA experts. The extended framework, encompassing a total of five iterative ethical reflection phases, provides simplified ethical guidance for SMA researchers and facilitates the ethical self-examination of research projects involving social media data.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factor structures associated with online student engagement in campus-based blended and online distance education settings","authors":"Graeme Pye, Dale M. Holt, S. Salzman","doi":"10.3127/ajis.v26i0.2667","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.2667","url":null,"abstract":"This research is strictly grounded in the work undertaken by Coates regarding traditional campus-based settings of student engagement and was applied to the online settings positioned within the domain settings of blended online learning design and practice in an Australian higher education business context. Utilising an online student survey instrument, across two consecutive academic years, undergraduate commerce students were invited to reflect upon their learning engagement experience through the lens of a common learning management system (LMS) a resource accessible to both campus-based and off-campus student cohorts. Subsequent analysis of the research reconfirms the existence of student engagement constructs of Coates in the blended online setting, but also unexpectedly revealed a previously unknown construct relating to Assessment. This new student engagement construct, Assessment, is identified as being a significant motivational factor relevant to student engagement in the context of the blended online learning environment of this higher education business undergraduate commerce course and is the focus of this exposition.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128199899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ackerley, Ben W. Morrison, Kate Ingrey, M. Wiggins, Piers Bayl-Smith, Natalie M. V. Morrison
{"title":"Errors, Irregularities, and Misdirection: Cue Utilisation and Cognitive Reflection in the Diagnosis of Phishing Emails","authors":"M. Ackerley, Ben W. Morrison, Kate Ingrey, M. Wiggins, Piers Bayl-Smith, Natalie M. V. Morrison","doi":"10.3127/ajis.v26i0.3615","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3615","url":null,"abstract":"The study aimed to examine the role of, and potential interplay between, cue utilisation and cognitive reflection in email users’ ability to accurately (and efficiently) differentiate between phishing and genuine emails. 145 participants completed the Cognitive Reflection Test (CRT), a phishing diagnostic task, and the Expert Intensive Skill Evaluation (EXPERTise 2.0) battery, which provided a gauge of users’ cue utilisation in the domain. The results revealed an interaction between users’ cognitive utilisation and cue reflection, whereby users low in both facets performed significantly worse in diagnosing phishing emails than all other groups. Further, those participants with both higher cue utilisation and cognitive reflection took significantly longer to make their diagnosis. It is concluded that a high level of cognitive reflection was able to compensate for a lower level of cue utilisation, and vice versa. Participants reported using seven types of cue during diagnosis, however, there was no significant relationship between the types of cues used and users’ level of cue utilisation. Taken together, the findings have implications to the design of user-level interventions in relation to the identification of vulnerable users, as well as the need to consider training approaches that extend beyond the use of simple cue inventories.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Serenko, Hiroshi Sasaki, Prashant C. Palvia, O. Sato
{"title":"Turnover in Japanese IT Professionals: Antecendants and Nuances","authors":"A. Serenko, Hiroshi Sasaki, Prashant C. Palvia, O. Sato","doi":"10.3127/ajis.v26i0.3037","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3037","url":null,"abstract":"The Japanese information technology (IT) workplace is unique compared to that of other nations. IT represents a large sector of the country’s economy, and organizations need to develop proactive approaches to retain their IT workforce. In order to manage employee turnover, they need to understand the distinctive factors influencing employee turnover intention, as turnover intention is known to be a reliable predictor of actual turnover. In this study, a model was constructed and tested with data collected from 284 Japanese IT professionals. Our findings show that the effects of work exhaustion, personal accomplishment, and friendship networks on turnover intention are fully mediated through job satisfaction. Work-home conflict has no impact on job satisfaction. The strength of the relationships is stronger for younger than for older organizations. Furthermore, individualistic factors (i.e., work exhaustion and personal accomplishment) have a stronger impact on job satisfaction than collectivistic factors (i.e., work-home conflict and friendship networks). These results show the fragility of the notion of long-term employment, which is supposed to be embraced within the entire Japanese work culture.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126904899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunities, ethical challenges, and value implications of pervasive sensing technology for supporting older adults in the work environment","authors":"C. Grünloh, M. Cabrita, C. Dantas, S. Ortet","doi":"10.3127/ajis.v26i0.3133","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3133","url":null,"abstract":"Responding to the challenges of demographic change, a growing number of eHealth solutions are appearing on the market, aiming to enable age-friendly living and working environments. Pervasive sensing and monitoring of workers' health-, behavioural-, emotional- and cognitive status to support their health and workability enable the creation of adaptive work environments and the provision of personalised interventions. However, this technology also introduces new challenges that go beyond user acceptance and privacy concerns. Based on a conceptual investigation and lessons learnt within the SmartWork project (H2020-826343), this paper outlines opportunities and ethical challenges of pervasive sensing technology in the work environment that aims to support active and healthy ageing for office workers in a holistic way, including their values and preferences. Only by identifying those challenges, implicated values and value tensions is it possible to convert them into design opportunities and find innovative ways to address identified tensions. The article outlines steps taken within the project and closes with a reflection on the limits of technological responses to societal problems and the need for regulations and changes on a societal level.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121621621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Process Stories to Foster Process Flexibility: The Experts' Viewpoint","authors":"N. Thuan, A. Hoang, M. Nkhoma, P. Antunes","doi":"10.3127/ajis.v26i0.3479","DOIUrl":"https://doi.org/10.3127/ajis.v26i0.3479","url":null,"abstract":"Process flexibility is essential for organizations coping with uncertainty, emergence, and change. In this study, we research how process stories may lessen friction in realizing flexible processes. We use friction as a metaphor, which characterizes the realization of flexible processes as handling two opposing forces: one pushes towards flexibility while the other pulls against flexibility. Using in-depth interviews with BPM experts as a data-gathering technique, we provide insights into the dynamics of friction in the BPM lifecycle. We also provide empirical evidence about the capability of process stories to lessen friction in realizing flexible processes. This research contributes to understand the context where process stories may be most fit to realize process flexibility and adds knowledge about practical complaints experienced by BPM experts when realizing process flexibility.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}