Dengya Zhu, S. Nimmagadda, Torsten Reiners, A. Rudra
{"title":"An Integrated Search Framework for Leveraging the Knowledge-Based Web Ecosystem","authors":"Dengya Zhu, S. Nimmagadda, Torsten Reiners, A. Rudra","doi":"10.3127/ajis.v24i0.2331","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2331","url":null,"abstract":"The explosion of information constrains the judgement of search terms associated with Knowledge-Based Web Ecosystem (KBWE), making the retrieval of relevant information and its knowledge management challenging. The existing information retrieval (IR) tools and their fusion in a framework need attention, in which search results can effectively be managed. In this article, we demonstrate the effective use of information retrieval services by a variety of users and agents in various KBWE scenarios. An innovative Integrated Search Framework (ISF) is proposed, which utilises crawling strategies, web search technologies and traditional database search methods. Besides, ISF offers comprehensive, dynamic, personalized, and organization-oriented information retrieval services, ranging from the Internet, extranet, intranet, to personal desktop. In this empirical research, experiments are carried out demonstrating the improvements in the search process, as discerned in the conceptual ISF. The experimental results show improved precision compared with other popular search engines.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"1 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does Consumers' Intention to Purchase Travel Online Differ Across Generations? : Empirical Evidence from Australia","authors":"Shavneet Sharma, Gurmeet Singh, S. Pratt","doi":"10.3127/ajis.v24i0.2751","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2751","url":null,"abstract":"This paper examines the differences in consumers' intention to purchase travel online across Millennials and Baby Boomers. The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is extended by including attitude, compatibility, innovativeness, perceived trust, and perceived risk variables. Data is collected using online questionnaires from Millennials (N=322) and Baby Boomers (N=318) in Australia. Overall, the empirical results revealed that factors affecting Australian consumers' intention to purchase travel online differ across generations. This study contributes to the literature by extending and testing the comprehensive research model to understand consumers' online travel purchase behaviour better.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128281646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated model combining ECM and UTAUT to explain users' post-adoption behaviour towards mobile payment systems","authors":"Sindhu Singh","doi":"10.3127/AJIS.V24I0.2695","DOIUrl":"https://doi.org/10.3127/AJIS.V24I0.2695","url":null,"abstract":"Technological progression in mobile phones has increased the popularity of mobile payments. Users can shop online through a mobile device, which is time saving and convenient. Mobile payment systems involve ongoing interactions between users and payment providers. The initial acceptance of mobile payment systems has been studied extensively, but few studies have attempted to understand users’ post-adoption behaviour. This study employs an integrated model with the unified theory of acceptance and use of technology (UTAUT) framework and the expectation confirmation model (ECM), along with two additional constructs: perceived security and trust. The empirical results show that the integrated model has a higher predictive power to explain continuance intentions for using mobile payment systems with significant factors of satisfaction, trust, performance expectancy, and effort expectancy. This study confirmed that the UTAUT model could be extended to explain post-adoption behaviour towards mobile payment systems. The study’s findings have theoretical and practical value to further the understanding of pre- and post-adoption behaviour towards mobile payment systems.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farkhondeh Hassandoust, Harminder Singh, Jocelyn E. Williams
{"title":"The Role of Contextualization in Individuals' Vulnerability to Phishing Attempts","authors":"Farkhondeh Hassandoust, Harminder Singh, Jocelyn E. Williams","doi":"10.3127/ajis.v24i0.2693","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2693","url":null,"abstract":"Hackers who engage in phishing manipulate their victims into revealing confidential information by exploiting their motives, habits, and cognitive biases. Drawing on heuristic-systematic processing and the anchoring effect, this study examines how the contextualization of phishing messages, in the form of modifications to their framing and content, affects individuals’ susceptibility to phishing. This study also investigates if there is a discrepancy between the way individuals believe they will react to phishing attempts and their actual reactions. Using two fake phishing campaigns and an online survey, we find that individuals are more susceptible to phishing attempts when the phishing messages they receive are specific to their context, thereby appealing to their psychological vulnerabilities. There is also a significant gap between how individuals believe they will react and their actual reactions to phishing attempts.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Data Strategy: Design Considerations and Reference Architecture for Data-Enabled Value Creation","authors":"Radhakrishnan Balakrishnan, Satyasiba Das, Manojit Chattopadhyay","doi":"10.3127/ajis.v24i0.2541","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2541","url":null,"abstract":"With the arrival of Big Data, organizations have started building data-enabled customer value propositions to increase monetizing and cost-saving opportunities. Organizations have to implement a set of guidelines, procedures, and processes to manage, process and transform data that could be leveraged for value creation. This study has approached the journey of an organization towards data-enabled value creation through four levels of data processing, such as data extraction, data transformation, value creation, and value delivery. This study has critical inferences on using data management solutions such as RDBMS, NoSQL, NewSQL, Big Data and real-time reporting tools to support transactional data in internal systems, and other types of data in external systems such as Social Media. The outcome of this study is a methodological technology independent data management framework an organization could use when building a strategy around data. This study provides guidelines for defining an enterprise-wide data management solution, helping both the academicians and practitioners.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116830509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hyperconnected Smart City Framework: Digital Resources Using Enhanced Pedagogical Techniques","authors":"Naureen Naqvi, S. Rehman, Z. Islam","doi":"10.3127/ajis.v24i0.2531","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2531","url":null,"abstract":"Recent technological advancements have given rise to the concept of hyper-connected smart cities being adopted around the world. These cities aspire to achieve better outcomes for citizens by improving the quality of service delivery, information sharing, and creating a sustainable environment. A smart city comprises of a network of interconnected devices also known as IoT (Internet of Things), which captures data and transmits it to a platform for analysis. This data covers a variety of information produced in large volumes also known as Big Data. From data capture to processing and storage, there are several stages where a breach in security and privacy could result in catastrophic impacts. Presently there is a gap in the centralization of knowledge to implement smart city services with a secure architecture. To bridge this gap, we present a framework that highlights challenges within the smart city applications and synthesizes the techniques feasible to solve them. Additionally, we analyze the impact of a potential breach on smart city applications and state-of-the-art architectures available. Furthermore, we identify the stakeholders who may have an interest in learning about the relationships between the significant aspects of a smart city. We demonstrate these relationships through force-directed network diagrams. They will help raise the awareness amongst the stakeholders for planning the development of a smart city. To complement our framework, we designed web-based interactive resources that are available from http://ausdigitech.com/smartcity/.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A post-publication review of \"Research directions in information systems field, current status and future trends: A literature analysis of AIS basket of top journals\"","authors":"Weng Marc Lim","doi":"10.3127/ajis.v24i0.2921","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2921","url":null,"abstract":"This post-publication review highlights the strengths and shortcomings of Mazaheri, Lagzian, and Hemmat (2020) and the key considerations for future systematic reviews in information systems.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"1753 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumer acceptance and continuance of mobile money: Secondary data insights from Africa using the technology acceptance model","authors":"A. Alhassan, Leon Li, K. Reddy, G. Duppati","doi":"10.3127/ajis.v24i0.2579","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2579","url":null,"abstract":"This research provides empirical results on context-based factors that determine the use of mobile money in Africa by employing a unique secondary data which provides a new perspective on the technology acceptance model (TAM) application. The hypothesised research model tests the context-based constructs to determine how these constructs affect peoples' intentions and attitudes towards the continued use of mobile money. Exploring these constructs provides an understanding of the insights into the marketing campaigns and growth of mobile money providers. The empirical results suggest that the availability of electricity is an important factor for mobile phone functionality and ongoing use of mobile money in the long run. There is also a correlation between regulations that are perceived to be enabling and the intentions of individuals to continue using mobile money. However, there is a negative correlation between rural dwellings and the intentions of individuals to adopt the use of mobile money which finds its basis in the inadequate mobile networks and national grid systems in rural areas.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124127826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Emergency Department Through Business Process Redesign: An empirical study","authors":"R. Pereira, L. Lapão, I. Bianchi, D. Amaral","doi":"10.3127/ajis.v24i0.2679","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2679","url":null,"abstract":"The Emergency Departments (ED) of hospitals are poised for continuous improvement due to increasing demand. The ED are places where the efficiency of the services provided can save lives and therefore it should be seen as an area of maximum interest for process optimisation. This research aims at verifying if the application of Business Process Management (BPM) heuristics positively impacts the length of stay (LoS), without deteriorating the quality of the service provided. The methodology that underlies this research is a case study carried out in the ED of a public hospital. The data was gathered from individual interviews, focus groups, direct observation and document analysis. The BPM life cycle stages were followed. In addition, a simulation tool was used, and heuristics were chosen based on Devil’s Quadrangle theory. Three scenarios of the ED were considered. Additionally, three heuristics and any combination of them were also considered. Results show that heuristics positively impact the time variable without affecting the quality of the service, resulting in value gains for the patient. In terms of time consumption, the average LoS in the process was reduced by 22.5%, 15.9%, and 20.9% for each of the considered scenarios, while the maximum LoS was reduced by 29.2%, 36.2% % and 37.4%. Implications from these results were analysed. The novelty of this research is supported by the absence of studies applying BPM heuristics to ED. This research is a step forward to ally BPM heuristics and ED processes.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating Information System Testing Gamification with Time Restrictions on Testers' Performance","authors":"Navid Memar, A. Krishna, D. McMeekin, T. Tan","doi":"10.3127/ajis.v24i0.2179","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2179","url":null,"abstract":"This paper presents the results obtained from the evaluation of gamified software testing platform that was developed following series of focus group discussions comprising of software developers and testers. The purpose of this study is to understand the effect of gamification as an additive method that can help improve the performance of software testers. Additionally, in this study, new metrics have been introduced to quantify the performance of software testers fairly and more accurately. Moreover, the effect of time restriction impacting on the performance of software testers will be discussed from results of this study. Findings suggest that the proposed metrics, which more accurately capture the difficulty level of the software code defects, are able to better analyse and compare the performances of software testers in the gamified testing environment. Moreover, results indicated that time restriction may compromise the performance of software testers and the quality of written software test code. On the other hand, results suggest that the performance of software testers in detecting low priority bugs in the gamified software-testing platform was better compared to the other more difficult to detect bugs.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122550655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}