{"title":"Towards developing a Healthcare Situation Monitoring Method for Smart City Initiatives: A Citizen Safety Perspective","authors":"S. Miah, H. Vu","doi":"10.3127/ajis.v24i0.2551","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2551","url":null,"abstract":"Research in Smart City development has been proliferated over the past few years, which focused heavily on various supporting service sectors, such as healthcare. However, little effort has been made to design health surveillance support systems, which is also important for the advancement of public healthcare monitoring as an essential smart city initiatives. From an information system (IS) design perspective, this paper introduces a social media-based health surveillance supporting method, which can automatically extricates relevant online posts for health symptom management and prediction. We describe and demonstrate an IS design approach in this paper for hay-fever prediction solution concept based on Twitter posts. This concept can be applicable to fully functional solution design by relevant practitioners in this field.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying a Systematic Literature Review and Content Analysis Method to Analyse Open Source Developers' Forking Motivation Interpretation, Categories and Consequences","authors":"Bee Bee Chua, Ying Zhang","doi":"10.3127/ajis.v24i0.1714","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.1714","url":null,"abstract":"In open source (OS) environments, forking is a powerful social collaborative technique that creates a social coding community and increases code visibility but it has not been adopted by OS software (OSS) developers. This paper investigates OS forking divergence using contextual frameworks (systematic literature review and content analysis) to analyse OSS developer forking motivation, interpretation, categorisation and consequences. We identified five theoretical forking patterns: 1) forking can revive original project health; 2) few effective frameworks exist to describe project-to-project developer migration; 3) there is a literature on social forking community behaviour; 4) poor guidance is a threat to forking; and 5) most research uses mixed methods. We introduce guidelines for OSS communities to reduce organisational barriers to developer motivation and highlight the important of understanding developer forking. The challenge remains to analyse forking and sustainability from a social community perspective, particularly how programming language, file repositories and developer interest can predict forking motivation and behaviour for both novice OSS developers or experienced developers who want to improve forking performance.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an Ontology and Ethics of Virtual Influencers","authors":"B. Robinson","doi":"10.3127/ajis.v24i0.2807","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2807","url":null,"abstract":"In 2018, TIME magazine named Miquela Souza one of the 25 most influential people on the internet, despite the fact she is not a person at all. Miquela is the first digitally created virtual influencer. This paper provides an initial analysis of some of the ontological and ethical issues associated with the rise of virtual influencers on social media platforms like Instagram. Through a focus on Miquela, it is argued that while these fabricated identities may cause uneasiness at first, there is nothing morally significant that distinguishes them from natural, ‘real life’ influencers. But, far from ‘business as usual’, the inability to separate ‘virtual’ and ‘real life’ influencers raises important questions about the ethical construction of identity, and how this may affect the ongoing preservation of social values like trust in online spaces. The paper draws on literature in personal identity and agency theory to establish the ontological claim that there is no meaningful difference between Miquela and other ‘real life’ influencers, which leads to the discussion about ethical issues including moral responsibility and motivation, and transparency. As of May 2020, this appears to be the first peer-reviewed article theorising about virtual influencers. There are significant opportunities for further research, both in terms of how we should conceptualise these identities, as well as more empirically based social research into how to preserve social values like trust in online spaces.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Using Value Tensions to Reframe the Value of Data Beyond Market-based Online Social Norms","authors":"Anisha T. J. Fernando, L. Scholl","doi":"10.3127/ajis.v24i0.2793","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2793","url":null,"abstract":"Making sense of data, its value and impact is imperative for individuals, organisations and societies to function in the cyber age. The online interactions through which data flows present many benefits. However, the consumption of data and its value is problematic due to an overreliance on market norms as a substitute for values-based online social norms and practices, creating value tensions. Understanding the implications of data is further complicated due to the complex contextual nature of online interactions. These challenges are addressed through efforts from technology organisations and policy initiatives. Largely absent from these efforts is an understanding of the values needed to ground healthy online social interactions, and processes that nurture and afford the practice of these values in contextual community settings. Value tensions as an ethics tool can surface and clarify these interpersonal needs in understanding data and its impact. Communities may be appropriately placed to grapple with these value tensions given the contextual nature of interactions. This discussion paper presents a preliminary research agenda raising questions on uncovering value tensions and understanding the values at stake to transform data practices and develop healthy online social norms, to reframe the value of data beyond market-based online social norms.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Three Harms of Gendered Technology","authors":"Lena Wang","doi":"10.3127/ajis.v24i0.2799","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2799","url":null,"abstract":"Marginalised groups experience both immediate and long-term detriment as a result of innovations in information systems. This paper explores three facets of technologically related gendered harm: physical, institutional, and psychological. These harms will be demonstrated by case studies. Firstly, technology can cause physical harm by denying women their bodily autonomy, demonstrated by the public availability of AI software that generates nude pictures of women, and smart home devices used in instances of domestic abuse. Secondly, technology can deny women institutional access, as increasingly widespread algorithms are shown to underperform on marginalised groups. Thirdly, anthropomorphised technology reflects and entrenches harmful stereotypes of women’s submissiveness, causing psychological harm. Reducing harm must go beyond ensuring a diversity of representation in STEM fields. We conclude that effective regulation should focus on the design features in technological innovations.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131611126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity, value sensing robots for LGBTIQ+ elderly, and the need for revised codes of conduct","authors":"Adam Poulsen, E. Fosch-Villaronga, O. Burmeister","doi":"10.3127/ajis.v24i0.2789","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2789","url":null,"abstract":"Until now, each profession has developed their professional codes of conduct independently. However, the use of robots and artificial intelligence is blurring professional delineations: aged care nurses work with lifting robots, tablet computers, and intelligent diagnostic systems, and health information system designers work with clinical teams. While robots assist the medical staff in extending the professional service they provide, it is not clear how professions adhere and adapt to the new reality. In this article, we reflect on how the insertion of robots may shape codes of conduct, in particular with regards to cybersecurity. We do so by focusing on the use of social robots for helping LGBTIQ+ elderly cope with loneliness and depression. Using robots in such a delicate domain of application changes how care is delivered, as now alongside the caregiver, there is a cyber-physical health information system that can learn from experience and act autonomously. Our contribution stresses the importance of including cybersecurity considerations in codes of conduct for both robot developers and caregivers as it is the human and not the machine which is responsible for ensuring the system’s security and the user’s safety.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review: Responsible use of technology to combat Cyberbullying among adolescents","authors":"C. Kaluarachchi, M. Warren, F. Jiang","doi":"10.3127/ajis.v24i0.2791","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2791","url":null,"abstract":"Cyberbullying has become a major challenge for authorities, parents, guardians and schools in particular, especially in the era of the digital world. This paper reviews available empirical research to examine the issues such as the responsible use of technology amongst young people, parents and schools responsibility to protect against Cyberbullying. The analysis revealed that the responsible use of technology provides better practices to encourage comparisons because of these new digital technologies. Parents and educators are the key to Cyber ethics, therefore teaching the responsible use of technology whilst focusing on Cyber ethics at the start of young people’s exposure to technology use may be an excellent strategy to reduce the growth and impact of Cyberbullying. The paper will also review good practices for young people, school communities and parents to prevent and manage Cyberbullying and unethical behaviours online. These claims are examined using current literature to ensure a better understanding of responsible use of technology and understanding of Cyberbullying in order to support young people to combat this immerging societal challenge.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rethinking IT Professional Ethics: Classical and Current Contexts","authors":"M. Wigan","doi":"10.3127/ajis.v24i0.2851","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2851","url":null,"abstract":"Professional computer ethics has widened its scope over the last 20 years as a direct result of the massive growth in computer mediated services by government and industry, and concerns over how data and interaction processes are recorded. These shifts are explored in conjunction with the parallel decline in community trust of government. The growing importance of a broader view and action framework for professional computer societies is delineated.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy by design: a Holochain exploration","authors":"K. Wahlstrom, Anwaar Ul Haq, O. Burmeister","doi":"10.3127/ajis.v24i0.2801","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2801","url":null,"abstract":"Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"160 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Shared Responsibility Model: Levers of Influence and Loci of Control to aid Regulation of Ethical Behaviour in Technology Platform Companies","authors":"Michael Wildenauer","doi":"10.3127/ajis.v24i0.2797","DOIUrl":"https://doi.org/10.3127/ajis.v24i0.2797","url":null,"abstract":"This exploratory paper provides social context for platform corporations and examples of ethical transgressions by them and then canvasses the role of various organizational actors in controlling the ethical behaviour of ‘platforms', which may be seen to be more than usually problematic in this regard. From this survey, the conclusion is drawn that there may be no single actor that offers sufficient leverage to change organizational ethical behaviour. The paper then suggests the Shared Responsibility Model as a possible conceptual framework for a better understanding of the issue of ethical control and recommends practical interventions that may assist in realizing ethical behaviour by platforms that more closely aligns with societal expectations. The paper offers a caution about the side-effects of interventions to improve ethical behaviour, before concluding by pointing out implications of these findings for state-actor regulators and avenues for future research.","PeriodicalId":106236,"journal":{"name":"Australas. J. Inf. Syst.","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132958019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}