Australas. J. Inf. Syst.最新文献

筛选
英文 中文
Towards developing a Healthcare Situation Monitoring Method for Smart City Initiatives: A Citizen Safety Perspective 为智慧城市计划开发医疗状况监测方法:公民安全视角
Australas. J. Inf. Syst. Pub Date : 2020-06-29 DOI: 10.3127/ajis.v24i0.2551
S. Miah, H. Vu
{"title":"Towards developing a Healthcare Situation Monitoring Method for Smart City Initiatives: A Citizen Safety Perspective","authors":"S. Miah, H. Vu","doi":"10.3127/ajis.v24i0.2551","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2551","url":null,"abstract":"Research in Smart City development has been proliferated over the past few years, which focused heavily on various supporting service sectors, such as healthcare. However, little effort has been made to design health surveillance support systems, which is also important for the advancement of public healthcare monitoring as an essential smart city initiatives. From an information system (IS) design perspective, this paper introduces a social media-based health surveillance supporting method, which can automatically extricates relevant online posts for health symptom management and prediction. We describe and demonstrate an IS design approach in this paper for hay-fever prediction solution concept based on Twitter posts. This concept can be applicable to fully functional solution design by relevant practitioners in this field.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying a Systematic Literature Review and Content Analysis Method to Analyse Open Source Developers' Forking Motivation Interpretation, Categories and Consequences 应用系统文献综述和内容分析法分析开源开发者的分叉动机、分类和后果
Australas. J. Inf. Syst. Pub Date : 2020-06-16 DOI: 10.3127/ajis.v24i0.1714
Bee Bee Chua, Ying Zhang
{"title":"Applying a Systematic Literature Review and Content Analysis Method to Analyse Open Source Developers' Forking Motivation Interpretation, Categories and Consequences","authors":"Bee Bee Chua, Ying Zhang","doi":"10.3127/ajis.v24i0.1714","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.1714","url":null,"abstract":"In open source (OS) environments, forking is a powerful social collaborative technique that creates a social coding community and increases code visibility but it has not been adopted by OS software (OSS) developers. This paper investigates OS forking divergence using contextual frameworks (systematic literature review and content analysis) to analyse OSS developer forking motivation, interpretation, categorisation and consequences. We identified five theoretical forking patterns: 1) forking can revive original project health; 2) few effective frameworks exist to describe project-to-project developer migration; 3) there is a literature on social forking community behaviour; 4) poor guidance is a threat to forking; and 5) most research uses mixed methods. We introduce guidelines for OSS communities to reduce organisational barriers to developer motivation and highlight the important of understanding developer forking. The challenge remains to analyse forking and sustainability from a social community perspective, particularly how programming language, file repositories and developer interest can predict forking motivation and behaviour for both novice OSS developers or experienced developers who want to improve forking performance.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards an Ontology and Ethics of Virtual Influencers 论虚拟影响者的本体论与伦理
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2807
B. Robinson
{"title":"Towards an Ontology and Ethics of Virtual Influencers","authors":"B. Robinson","doi":"10.3127/ajis.v24i0.2807","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2807","url":null,"abstract":"In 2018, TIME magazine named Miquela Souza one of the 25 most influential people on the internet, despite the fact she is not a person at all. Miquela is the first digitally created virtual influencer. This paper provides an initial analysis of some of the ontological and ethical issues associated with the rise of virtual influencers on social media platforms like Instagram. Through a focus on Miquela, it is argued that while these fabricated identities may cause uneasiness at first, there is nothing morally significant that distinguishes them from natural, ‘real life’ influencers. But, far from ‘business as usual’, the inability to separate ‘virtual’ and ‘real life’ influencers raises important questions about the ethical construction of identity, and how this may affect the ongoing preservation of social values like trust in online spaces. The paper draws on literature in personal identity and agency theory to establish the ontological claim that there is no meaningful difference between Miquela and other ‘real life’ influencers, which leads to the discussion about ethical issues including moral responsibility and motivation, and transparency. As of May 2020, this appears to be the first peer-reviewed article theorising about virtual influencers. There are significant opportunities for further research, both in terms of how we should conceptualise these identities, as well as more empirically based social research into how to preserve social values like trust in online spaces.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Towards Using Value Tensions to Reframe the Value of Data Beyond Market-based Online Social Norms 利用价值张力重构基于市场的网络社会规范之外的数据价值
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2793
Anisha T. J. Fernando, L. Scholl
{"title":"Towards Using Value Tensions to Reframe the Value of Data Beyond Market-based Online Social Norms","authors":"Anisha T. J. Fernando, L. Scholl","doi":"10.3127/ajis.v24i0.2793","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2793","url":null,"abstract":"Making sense of data, its value and impact is imperative for individuals, organisations and societies to function in the cyber age. The online interactions through which data flows present many benefits. However, the consumption of data and its value is problematic due to an overreliance on market norms as a substitute for values-based online social norms and practices, creating value tensions. Understanding the implications of data is further complicated due to the complex contextual nature of online interactions. These challenges are addressed through efforts from technology organisations and policy initiatives. Largely absent from these efforts is an understanding of the values needed to ground healthy online social interactions, and processes that nurture and afford the practice of these values in contextual community settings. Value tensions as an ethics tool can surface and clarify these interpersonal needs in understanding data and its impact. Communities may be appropriately placed to grapple with these value tensions given the contextual nature of interactions. This discussion paper presents a preliminary research agenda raising questions on uncovering value tensions and understanding the values at stake to transform data practices and develop healthy online social norms, to reframe the value of data beyond market-based online social norms.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Three Harms of Gendered Technology 性别化技术的三大危害
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2799
Lena Wang
{"title":"The Three Harms of Gendered Technology","authors":"Lena Wang","doi":"10.3127/ajis.v24i0.2799","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2799","url":null,"abstract":"Marginalised groups experience both immediate and long-term detriment as a result of innovations in information systems. This paper explores three facets of technologically related gendered harm: physical, institutional, and psychological. These harms will be demonstrated by case studies. Firstly, technology can cause physical harm by denying women their bodily autonomy, demonstrated by the public availability of AI software that generates nude pictures of women, and smart home devices used in instances of domestic abuse. Secondly, technology can deny women institutional access, as increasingly widespread algorithms are shown to underperform on marginalised groups. Thirdly, anthropomorphised technology reflects and entrenches harmful stereotypes of women’s submissiveness, causing psychological harm. Reducing harm must go beyond ensuring a diversity of representation in STEM fields. We conclude that effective regulation should focus on the design features in technological innovations.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131611126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cybersecurity, value sensing robots for LGBTIQ+ elderly, and the need for revised codes of conduct 网络安全,LGBTIQ+老年人的价值感知机器人,以及修订行为准则的必要性
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2789
Adam Poulsen, E. Fosch-Villaronga, O. Burmeister
{"title":"Cybersecurity, value sensing robots for LGBTIQ+ elderly, and the need for revised codes of conduct","authors":"Adam Poulsen, E. Fosch-Villaronga, O. Burmeister","doi":"10.3127/ajis.v24i0.2789","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2789","url":null,"abstract":"Until now, each profession has developed their professional codes of conduct independently. However, the use of robots and artificial intelligence is blurring professional delineations: aged care nurses work with lifting robots, tablet computers, and intelligent diagnostic systems, and health information system designers work with clinical teams. While robots assist the medical staff in extending the professional service they provide, it is not clear how professions adhere and adapt to the new reality. In this article, we reflect on how the insertion of robots may shape codes of conduct, in particular with regards to cybersecurity. We do so by focusing on the use of social robots for helping LGBTIQ+ elderly cope with loneliness and depression. Using robots in such a delicate domain of application changes how care is delivered, as now alongside the caregiver, there is a cyber-physical health information system that can learn from experience and act autonomously. Our contribution stresses the importance of including cybersecurity considerations in codes of conduct for both robot developers and caregivers as it is the human and not the machine which is responsible for ensuring the system’s security and the user’s safety.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Review: Responsible use of technology to combat Cyberbullying among adolescents 审查:负责任地使用技术打击青少年中的网络欺凌
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2791
C. Kaluarachchi, M. Warren, F. Jiang
{"title":"Review: Responsible use of technology to combat Cyberbullying among adolescents","authors":"C. Kaluarachchi, M. Warren, F. Jiang","doi":"10.3127/ajis.v24i0.2791","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2791","url":null,"abstract":"Cyberbullying has become a major challenge for authorities, parents, guardians and schools in particular, especially in the era of the digital world. This paper reviews available empirical research to examine the issues such as the responsible use of technology amongst young people, parents and schools responsibility to protect against Cyberbullying. The analysis revealed that the responsible use of technology provides better practices to encourage comparisons because of these new digital technologies. Parents and educators are the key to Cyber ethics, therefore teaching the responsible use of technology whilst focusing on Cyber ethics at the start of young people’s exposure to technology use may be an excellent strategy to reduce the growth and impact of Cyberbullying. The paper will also review good practices for young people, school communities and parents to prevent and manage Cyberbullying and unethical behaviours online. These claims are examined using current literature to ensure a better understanding of responsible use of technology and understanding of Cyberbullying in order to support young people to combat this immerging societal challenge.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Rethinking IT Professional Ethics: Classical and Current Contexts 重新思考IT职业道德:古典与当前语境
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2851
M. Wigan
{"title":"Rethinking IT Professional Ethics: Classical and Current Contexts","authors":"M. Wigan","doi":"10.3127/ajis.v24i0.2851","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2851","url":null,"abstract":"Professional computer ethics has widened its scope over the last 20 years as a direct result of the massive growth in computer mediated services by government and industry, and concerns over how data and interaction processes are recorded. These shifts are explored in conjunction with the parallel decline in community trust of government. The growing importance of a broader view and action framework for professional computer societies is delineated.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy by design: a Holochain exploration 隐私设计:全链探索
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2801
K. Wahlstrom, Anwaar Ul Haq, O. Burmeister
{"title":"Privacy by design: a Holochain exploration","authors":"K. Wahlstrom, Anwaar Ul Haq, O. Burmeister","doi":"10.3127/ajis.v24i0.2801","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2801","url":null,"abstract":"Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"160 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Shared Responsibility Model: Levers of Influence and Loci of Control to aid Regulation of Ethical Behaviour in Technology Platform Companies 共同责任模型:影响杠杆和控制位点对技术平台公司道德行为监管的帮助
Australas. J. Inf. Syst. Pub Date : 2020-06-08 DOI: 10.3127/ajis.v24i0.2797
Michael Wildenauer
{"title":"The Shared Responsibility Model: Levers of Influence and Loci of Control to aid Regulation of Ethical Behaviour in Technology Platform Companies","authors":"Michael Wildenauer","doi":"10.3127/ajis.v24i0.2797","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2797","url":null,"abstract":"This exploratory paper provides social context for platform corporations and examples of ethical transgressions by them and then canvasses the role of various organizational actors in controlling the ethical behaviour of ‘platforms', which may be seen to be more than usually problematic in this regard. From this survey, the conclusion is drawn that there may be no single actor that offers sufficient leverage to change organizational ethical behaviour. The paper then suggests the Shared Responsibility Model as a possible conceptual framework for a better understanding of the issue of ethical control and recommends practical interventions that may assist in realizing ethical behaviour by platforms that more closely aligns with societal expectations. The paper offers a caution about the side-effects of interventions to improve ethical behaviour, before concluding by pointing out implications of these findings for state-actor regulators and avenues for future research.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132958019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信