ems

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




ems

The Relationship Between Critical Success Factors, Perceived Benefits, and Usage Intention of Mobile Knowledge Management Systems in the Malaysian Semiconductor Industry

Aim/Purpose: This study examined the relationship between critical success factors (CSFs), perceived benefits, and usage intention of Mobile Knowledge Management Systems (MKMS) via an integrated Technology Acceptance Model (TAM) and Information Systems Success Model (ISSM). Background: This study investigates the CSFs (i.e., Strategic Leadership, Employee Training, System Quality, and Information Quality) that impact the usage intention of KMS in mobile contexts which have been neglected. Since users normally consider the usefulness belief in a system before usage, this study examines the role of perceived benefits as a mediator between the CSFs and usage intention. Methodology: A survey-based research approach in the Malaysian semiconductor industry was employed via an integrated model of TAM and ISSM. At a response rate of 59.52%, the findings of this study were based on 375 usable responses. The data collected was analyzed using the Partial Least Squares with SmartPLS 3.0. Contribution: This study contributes to the body of knowledge in the areas of mobile technology acceptance and knowledge management. Specifically, it helps to validate the integrated model of TAM and ISSM with the CSFs from knowledge management and information system. In addition, it provides the would-be adopters of MKMS with valuable guidelines and insights to consider before embarking on the adoption stage. Findings: The findings suggest that Employee Training and Information Quality have a positive significant relationship with Perceived MKMS Benefits. On the contrary, Strategic Leadership, System Quality, and Perceived User-friendliness showed an insignificant relationship with Perceived MKMS Benefits. Additionally, Employee Training and Information Quality have an indirect relationship with MKMS Usage Intention which is mediated by Perceived MKMS Benefits. Recommendations for Practitioners: The findings are valuable for managers, engineers, KM practitioners, KM consultants, MKMS developers, and mobile device producers to enhance MKMS usage intention. Recommendation for Researchers: Researchers would be able to conduct more inter-disciplinary studies to better understand the relevant issues concerning both fields – knowledge management and mobile computing disciplines. Additionally, the mediation effect of TAM via Perceived Usefulness (i.e., perceived MKMS benefits) on usage intention of MKMS should be further investigated with other CSFs. Future Research: Future studies could perhaps include other critical factors from both KM and IS as part of the external variables. Furthermore, Perceived Ease of Use (i.e., Perceived User-friendly) should be tested as a mediator in the future, together with Perceived Usefulness (i.e., perceived MKMS Benefits) to compare which would be a more powerful predictor of usage intention. Moreover, it may prove interesting to find out how the research framework would fit into other industries to verify the findings of this study for better accuracy and generalizability.




ems

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




ems

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




ems

Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE

Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users.




ems

The Influence of COVID-19 on Employees’ Use of Organizational Information Systems

Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis.




ems

A Model Predicting Student Engagement and Intention with Mobile Learning Management Systems

Aim/Purpose: The aim of this study is to develop and evaluate a comprehensive model that predicts students’ engagement with and intent to continue using mobile-Learning Management Systems (m-LMS). Background: m-LMS are increasingly popular tools for delivering course content in higher education. Understanding the factors that affect student engagement and continuance intention can help educational institutions to develop more effective and user-friendly m-LMS platforms. Methodology: Participants with prior experience with m-LMS were employed to develop and evaluate the proposed model that draws on the Technology Acceptance Model (TAM), Task-Technology Fit (TTF), and other related models. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to evaluate the model. Contribution: The study provides a comprehensive model that takes into account a variety of factors affecting engagement and continuance intention and has a strong predictive capability. Findings: The results of the study provide evidence for the strong predictive capability of the proposed model and supports previous research. The model identifies perceived usefulness, perceived ease of use, interactivity, compatibility, enjoyment, and social influence as factors that significantly influence student engagement and continuance intention. Recommendations for Practitioners: The findings of this study can help educational institutions to effectively meet the needs of students for interactive, effective, and user-friendly m-LMS platforms. Recommendation for Researchers: This study highlights the importance of understanding the antecedents of students’ engagement with m-LMS. Future research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability. Impact on Society: The engagement model can help educational institutions to understand how to improve student engagement and continuance intention with m-LMS, ultimately leading to more effective and efficient mobile learning. Future Research: Additional research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability.




ems

To be intelligent or not to be? That is the question - reflection and insights about big knowledge systems: definition, model and semantics

This paper aims to share the author's vision on possible research directions for big knowledge-based AI. A renewed definition of big knowledge (BK) and big knowledge systems (BKS) is first introduced. Then the first BKS model, called cloud knowledge social intelligence (CKEI) is provided with a hierarchy of knowledge as a service (KAAS). At last, a new semantics, the big-and-broad step axiomatic structural operational semantics (BBASOS) for applications on BKS is introduced and discussed with a practical distributed BKS model knowledge graph network KGN and a mini example.




ems

Modeling the Organizational Aspects of Learning Objects in Semantic Web Approaches to Information Systems




ems

Learning Objects: Using Language Structures to Understand the Transition from Affordance Systems to Intelligent Systems




ems

Analysing Online Teaching and Learning Systems Using MEAD




ems

A Systems Engineering Analysis Method for the Development of Reusable Computer-Supported Learning Systems




ems

Quality Metrics for PDA-based M-Learning Information Systems




ems

Learning Object Systems and Strategy: A Description and Discussion




ems

Development and Validation of a Model to Investigate the Impact of Individual Factors on Instructors’ Intention to Use E-learning Systems




ems

Learning about Ecological Systems by Constructing Qualitative Models with DynaLearn




ems

What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability?




ems

Matching Office Information Systems (OIS) Curriculum To Relevant Standards: Students, School Mission, Regional Business Needs, and National Curriculum




ems

Informing Clientele through Networked Multimedia Information Systems: Introduction to the Special Issues




ems

Teaching Information Quality in Information Systems Undergraduate Education




ems

Building an Internet-Based Learning Environment in Higher Education: Learner Informing Systems and the Life Cycle Approach




ems

Toward A Methodology For Managing Information Systems Implementation: A Social Constructivist Perspective




ems

The Value of Information Systems Teaching and Research in the Knowledge Society




ems

Knowledge Management Systems: A Comparison of Law Firms and Consulting Firms




ems

Information Systems Executives: The Changing Role of New IS/IT Leaders




ems

An Action-Oriented Perspective of Information Systems in Organizations




ems

Differences in Stage of Integration between Business Planning and Information Systems Planning according to Value Configurations




ems

Informing South African Students about Information Systems




ems

Bridging the Digital Divide through Educational Initiatives: Problems and Solutions




ems

Web-Based Interactions Support for Information Systems




ems

Data Security Management in Distributed Computer Systems




ems

Five Roles of an Information System: A Social Constructionist Approach to Analysing the Use of ERP Systems




ems

Applications of Geographical Information Systems in Understanding Spatial Distribution of Asthma




ems

Communicating Academic Research Findings to IS Professionals: An Analysis of Problems




ems

Pathways to Enhance Environmental Assessment Information Systems




ems

The Value of User Participation in E-Commerce Systems Development




ems

Informing Systems in Business Environments: A Purpose-Focused View




ems

Exploring the Myths about Online Education in Information Systems




ems

A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research




ems

Good Intuition or Fear and Uncertainty: The Effects of Bias on Information Systems Selection Decisions




ems

A Double Helix Metaphor for Use and Usefulness in Informing Systems




ems

The Culture of Information Systems in Knowledge-Creating Contexts: The Role of User-Centred Design




ems

Using Double Helix Relationships to Understand and Change Informing Systems




ems

Double Helix Relationships in Use and Design of Informing Systems: Lessons to Learn from Phenomenology and Hermeneutics




ems

The Changing Face of Information Systems Research:A Longitudinal Study of Author Influence




ems

Overcoming the Challenge of Cooperating with Competitors: Critical Success Factors of Interorganizational Systems Implementation




ems

Integrating the Visual Design Discipline with Information Systems Research and Practice




ems

Backbone or Helping Hand? On the Role of Information Systems and Non-systematic Information in Managers’ Work




ems

Online Learning and Case Teaching: Implications in an Informing Systems Framework




ems

The Role of Case Studies in Informing Systems: Introduction to the Special Series