systems Business Intelligence Systems in the Holistic Infrastructure Development Supporting Decision Making in Organisations By Published On :: Full Article
systems A Framework for Designing Nursing Knowledge Management Systems By Published On :: Full Article
systems Approach to Building and Implementing Business Intelligence Systems By Published On :: Full Article
systems Integrated Information Systems - A Challenge for Long-Term Digital Preservation By Published On :: Full Article
systems Experiences in Building and Using Decision-Support Systems in Postgraduate University Courses By Published On :: Full Article
systems Framework for Quality Metrics in Mobile-Wireless Information Systems By Published On :: Full Article
systems Can We Help Information Systems Students Improve Their Ethical Decision Making? By Published On :: Full Article
systems A Return on Investment as a Metric for Evaluating Information Systems: Taxonomy and Application By Published On :: Full Article
systems A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research By Published On :: Full Article
systems Knowledge Management Systems Development: Theory and Practice By Published On :: Full Article
systems Critical Success Factors for Implementing Business Intelligence Systems in Small and Medium Enterprises on the Example of Upper Silesia, Poland By Published On :: Full Article
systems Critical Success Factors for ERP Systems Implementation in Public Administration By Published On :: Full Article
systems The Survey of Information Systems in Public Administration in Poland By Published On :: Full Article
systems Change management in information systems projects for public organizations By Published On :: 2015-08-02 It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work. Full Article
systems Accounting Information Systems Effectiveness: Evidence from the Nigerian Banking Sector By Published On :: 2017-12-04 Aim/Purpose: The purpose of this study is to investigate the interrelationship among the quality measures of information system success, including system quality, information, quality, and service quality, that eventually influence accounting information systems effectiveness. Background: It is generally believed that investment in an information system offers opportunities to organizations for business process efficiency and effectiveness. Despite huge investments in accounting information systems, banks in Nigeria have not realized the full potential benefits of using these systems because of persistent failures. Few studies have been conducted to address the problem. Methodology: A survey research design was used to collect data, and a total of 287 questionnaires were retrieved from respondents in the Nigerian banking sector. Contribution: This study contributes to the understanding of the most important antecedent factors of the quality measures, the interrelationship among the quality measures, and the influence of these measures on the accounting information systems effectiveness. Findings: The result of the study revealed that security, ease of use, and efficiency are key features of system quality, while the information quality dimension includes accuracy, timeliness, and completeness. The result of the study further revealed that information quality and system quality have significant influences on accounting information systems effectiveness. Recommendations for Practitioners: This study provides practitioners with important measures for evaluation of AIS effectiveness in the context of Nigerian banks. Recommendation for Researchers: Future researchers may build on the findings of current study to conduct fur-ther research in the area of AIS effectiveness in different contexts. Future Research: This study examines only three quality measures of Delone and Mclean model and antecedents of information and system quality measures, neglecting contingency factor. Therefore, future study should include other factors to the AIS effectiveness model to help in developing more specific theory in AIS domain. Full Article
systems Understanding Internal Information Systems Security Policy Violations as Paradoxes By Published On :: 2017-01-17 Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful. Full Article
systems Socio-Technical Approach, Decision-Making Environment, and Sustainable Performance: Role of ERP Systems By Published On :: 2018-12-03 Aim/Purpose: This explanatory study aimed to determine the mediating role of ERP in the relation between the effect of a socio-technical approach and decision-making environment, and firms’ sustainable performance. Background: Although earlier studies have discussed the critical success factors of the failure or success of an ERP system and the extent to which it achieves its desired objectives, the current study focused on the significant impact of socio-technical elements and decision-making environment on the success of the ERP system (i.e., sustainable performance). In addition, the lack of research on ERP as a mediator in the above relationship motivated this study to bridge the literature gap. Methodology: The data was collected using questionnaires distributed to 233 randomly selected employees of three multinational companies (BP, LUKOIL, and Eni) operating in Iraq. The structural equation modeling was employed to test the hypothesized relationships. Contribution: The study contributes to the literature by examining the mediating role of the ERP system in the relationship between socio-technical elements and the decision-making environment, as well as, the moderating role of organizational culture in the relationship between socio-technical elements and ERP systems. Findings: The results showed that ERP is a significant mediator between the linkage of socio-technical elements and the decision-making environment while organizational culture has an insignificant moderating role in the relationship between socio-technical elements and ERP systems. Recommendations for Practitioners: In a developing country like Iraq, there is a need to implement ERP to achieve better sustainable performance through change management and organizational development that ultimately work towards enhancing individual capabilities, knowledge, and training. Recommendation for Researchers: The researchers are recommended to conduct an in-depth study of the phenomenon based on theoretical and empirical grounds, particularly in light of the relationship of socio-technical elements and decision-making environments. Impact on Society: This study provides a reference for organizations with similar cultural backgrounds in using ERP systems to minimize pollution in Iraqi context. Future Research: A more in-depth study can be performed using a bigger sample, which not only includes the oil industry but also the other industries. Full Article
systems The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector By Published On :: 2018-02-10 Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems. Full Article
systems Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective By Published On :: 2021-08-07 Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS. Full Article
systems The Relationship Between Critical Success Factors, Perceived Benefits, and Usage Intention of Mobile Knowledge Management Systems in the Malaysian Semiconductor Industry By Published On :: 2022-10-03 Aim/Purpose: This study examined the relationship between critical success factors (CSFs), perceived benefits, and usage intention of Mobile Knowledge Management Systems (MKMS) via an integrated Technology Acceptance Model (TAM) and Information Systems Success Model (ISSM). Background: This study investigates the CSFs (i.e., Strategic Leadership, Employee Training, System Quality, and Information Quality) that impact the usage intention of KMS in mobile contexts which have been neglected. Since users normally consider the usefulness belief in a system before usage, this study examines the role of perceived benefits as a mediator between the CSFs and usage intention. Methodology: A survey-based research approach in the Malaysian semiconductor industry was employed via an integrated model of TAM and ISSM. At a response rate of 59.52%, the findings of this study were based on 375 usable responses. The data collected was analyzed using the Partial Least Squares with SmartPLS 3.0. Contribution: This study contributes to the body of knowledge in the areas of mobile technology acceptance and knowledge management. Specifically, it helps to validate the integrated model of TAM and ISSM with the CSFs from knowledge management and information system. In addition, it provides the would-be adopters of MKMS with valuable guidelines and insights to consider before embarking on the adoption stage. Findings: The findings suggest that Employee Training and Information Quality have a positive significant relationship with Perceived MKMS Benefits. On the contrary, Strategic Leadership, System Quality, and Perceived User-friendliness showed an insignificant relationship with Perceived MKMS Benefits. Additionally, Employee Training and Information Quality have an indirect relationship with MKMS Usage Intention which is mediated by Perceived MKMS Benefits. Recommendations for Practitioners: The findings are valuable for managers, engineers, KM practitioners, KM consultants, MKMS developers, and mobile device producers to enhance MKMS usage intention. Recommendation for Researchers: Researchers would be able to conduct more inter-disciplinary studies to better understand the relevant issues concerning both fields – knowledge management and mobile computing disciplines. Additionally, the mediation effect of TAM via Perceived Usefulness (i.e., perceived MKMS benefits) on usage intention of MKMS should be further investigated with other CSFs. Future Research: Future studies could perhaps include other critical factors from both KM and IS as part of the external variables. Furthermore, Perceived Ease of Use (i.e., Perceived User-friendly) should be tested as a mediator in the future, together with Perceived Usefulness (i.e., perceived MKMS Benefits) to compare which would be a more powerful predictor of usage intention. Moreover, it may prove interesting to find out how the research framework would fit into other industries to verify the findings of this study for better accuracy and generalizability. Full Article
systems Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems By Published On :: 2022-07-26 Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed. Full Article
systems How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia By Published On :: 2023-09-07 Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors. Full Article
systems Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE By Published On :: 2023-07-25 Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users. Full Article
systems The Influence of COVID-19 on Employees’ Use of Organizational Information Systems By Published On :: 2023-06-27 Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis. Full Article
systems A Model Predicting Student Engagement and Intention with Mobile Learning Management Systems By Published On :: 2023-04-25 Aim/Purpose: The aim of this study is to develop and evaluate a comprehensive model that predicts students’ engagement with and intent to continue using mobile-Learning Management Systems (m-LMS). Background: m-LMS are increasingly popular tools for delivering course content in higher education. Understanding the factors that affect student engagement and continuance intention can help educational institutions to develop more effective and user-friendly m-LMS platforms. Methodology: Participants with prior experience with m-LMS were employed to develop and evaluate the proposed model that draws on the Technology Acceptance Model (TAM), Task-Technology Fit (TTF), and other related models. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to evaluate the model. Contribution: The study provides a comprehensive model that takes into account a variety of factors affecting engagement and continuance intention and has a strong predictive capability. Findings: The results of the study provide evidence for the strong predictive capability of the proposed model and supports previous research. The model identifies perceived usefulness, perceived ease of use, interactivity, compatibility, enjoyment, and social influence as factors that significantly influence student engagement and continuance intention. Recommendations for Practitioners: The findings of this study can help educational institutions to effectively meet the needs of students for interactive, effective, and user-friendly m-LMS platforms. Recommendation for Researchers: This study highlights the importance of understanding the antecedents of students’ engagement with m-LMS. Future research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability. Impact on Society: The engagement model can help educational institutions to understand how to improve student engagement and continuance intention with m-LMS, ultimately leading to more effective and efficient mobile learning. Future Research: Additional research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability. Full Article
systems To be intelligent or not to be? That is the question - reflection and insights about big knowledge systems: definition, model and semantics By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 This paper aims to share the author's vision on possible research directions for big knowledge-based AI. A renewed definition of big knowledge (BK) and big knowledge systems (BKS) is first introduced. Then the first BKS model, called cloud knowledge social intelligence (CKEI) is provided with a hierarchy of knowledge as a service (KAAS). At last, a new semantics, the big-and-broad step axiomatic structural operational semantics (BBASOS) for applications on BKS is introduced and discussed with a practical distributed BKS model knowledge graph network KGN and a mini example. Full Article
systems Modeling the Organizational Aspects of Learning Objects in Semantic Web Approaches to Information Systems By Published On :: Full Article
systems Learning Objects: Using Language Structures to Understand the Transition from Affordance Systems to Intelligent Systems By Published On :: Full Article
systems A Systems Engineering Analysis Method for the Development of Reusable Computer-Supported Learning Systems By Published On :: Full Article
systems Learning Object Systems and Strategy: A Description and Discussion By Published On :: Full Article
systems Development and Validation of a Model to Investigate the Impact of Individual Factors on Instructors’ Intention to Use E-learning Systems By Published On :: Full Article
systems Learning about Ecological Systems by Constructing Qualitative Models with DynaLearn By Published On :: Full Article
systems What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability? By Published On :: Full Article
systems Matching Office Information Systems (OIS) Curriculum To Relevant Standards: Students, School Mission, Regional Business Needs, and National Curriculum By Published On :: Full Article
systems Informing Clientele through Networked Multimedia Information Systems: Introduction to the Special Issues By Published On :: Full Article
systems Teaching Information Quality in Information Systems Undergraduate Education By Published On :: Full Article
systems Building an Internet-Based Learning Environment in Higher Education: Learner Informing Systems and the Life Cycle Approach By Published On :: Full Article
systems Toward A Methodology For Managing Information Systems Implementation: A Social Constructivist Perspective By Published On :: Full Article
systems The Value of Information Systems Teaching and Research in the Knowledge Society By Published On :: Full Article
systems Knowledge Management Systems: A Comparison of Law Firms and Consulting Firms By Published On :: Full Article
systems Information Systems Executives: The Changing Role of New IS/IT Leaders By Published On :: Full Article
systems An Action-Oriented Perspective of Information Systems in Organizations By Published On :: Full Article
systems Differences in Stage of Integration between Business Planning and Information Systems Planning according to Value Configurations By Published On :: Full Article