information

Evolution of Information Technology in Industry: A Systematic Literature Review

Aim/Purpose. This study addresses the research question: “What are the developmental phases of Information Technology in the industry?” Existing research has explored the impact of Information Technology (IT) on specific industries. However, it is essential to understand the evolution of IT within industries, its influence on the workforce, and technological advancements. Addressing this knowledge gap will enhance future workforce development and IT integration across diverse sectors. Background. IT can significantly transform industries and drive innovation to meet client demands. Understanding IT phases in industry through literature helps governments and businesses worldwide recognize its importance. This knowledge can guide strategies to address the shortage of highly skilled workers by prioritizing education and training programs to meet future demands. Methodology The methodology involved a systematic literature review of 110 IEEE Xplore, ACM Digital Library, and Google Scholar articles. Thematic analysis was used to understand the development of IT in distinct phases since the 1990s. This development has resulted in a continuous demand for new workforce skills and evolving customer expectations. Contribution. This study aims to fill the knowledge gap by enhancing our understanding of how evolving IT influences the industry and shapes IT jobs and skills. It provides a historical perspective, illustrating how IT advancements have led to new applications to meet changing needs. Additionally, the study identifies patterns in the evolving IT skill requirements due to technological advancements and discusses implications for curriculum development and higher education. Findings. The study identified three significant phases through a systematic literature review and thematic analysis. The first phase, “Advent of Industry IT” (1990-2000), established the digital framework and built essential systems and infrastructure. The second phase, “Connectivity & Information Revolution” (2000-2010), saw exponential internet growth, transforming information access and communication. The third phase, “Emerging Industry IT” (2010-present), focuses on artificial intelligence, automation, and data-driven insights, continuing to disrupt and transform industries. Recommendations for Practitioners. The changing phases of IT within the industry should inform the development of innovative programs. These programs should address diverse skill sets across eras, preparing the workforce for evolving job roles in various sectors, such as healthcare in North America, automotive manufacturing in Japan, telecommunications in Africa, and innovations in other parts of the world. Recommendations for Researchers. Researchers can conduct longitudinal studies to explore the ongoing evolution of IT, tracking its trajectory beyond current delineated phases to understand future trends. Comparative studies across various industries can assess how IT evolution varies among sectors and delve deeper into its practical implications. Researchers can also conduct impact assessment studies to determine how various IT phases directly affect organizational strategy, worker dynamics, and organizational structures across industries. Examples include logistics in the Netherlands, retail in the United Kingdom, and agriculture in Brazil. Impact on Society. Policymakers and planners can use knowledge of these phases to predict technological shifts and industry trends. This knowledge helps develop strategies and policies supporting entrepreneurship, education and training alignment, technical innovation, economic growth, and job creation in line with the changing IT landscape. Examples of policies include Singapore’s Smart Nation initiative, Germany’s Industry 4.0 strategy, Ghana’s digitization efforts, and India’s Digital India campaign. Future Research. Future research can provide a thorough understanding of the evolutionary patterns of IT within sectors by validating the study through various datasets and conducting in-depth examinations of individual industries. This will contribute to a deeper understanding of sector-specific IT evolution and their varying impact on societal interactions and industry dynamics. Comparative studies across various sectors, such as logistics in the Netherlands, retail in the United Kingdom, and agriculture in Brazil, can assess how IT evolution varies.




information

Information Technology in Healthcare: A Systematic Literature Review

Aim/Purpose. The aim of this study is to recognize the factors that contributed to the development of IT in the healthcare industry. Background. The healthcare Information Technology (IT) solutions market has experienced remarkable growth, with the healthcare sector emerging as a $303 billion industry. However, despite its substantial size, the healthcare industry has faced criticism for its slow adoption of innovative technologies. This study aims to explore factors driving the evolution of IT in the healthcare sector. Methodology. The researchers conducted a systematic literature review, searching the PubMed and Emerald databases for relevant peer-reviewed articles. After filtering based on defined criteria, 433 articles were included for analysis. Thematic analysis was applied to the abstract of articles which spanned the period of 1997 to 2023. Contribution. This study provides a conceptual framework elucidating the key factors driving the evolution of IT in the healthcare industry. By systematically analyzing the existing literature, the research identifies four overarching themes – government policies, technological potentials, healthcare delivery needs, and organizational motivations – that have propelled the development and adoption of healthcare IT solutions. Provide a conceptual model for understanding, and design of the healthcare it solutions. Findings. Based on the analysis in this paper, four themes emerged: government policies promoting IT adoption through initiatives like incentives for electronic health records; technological breakthroughs enabling new healthcare IT capabilities; healthcare delivery needs to drive IT integration for improved quality and safety; and patient experience and organizational motivations to leverage IT for streamlining processes and knowledge management. Recommendations for Practitioners. The conceptual model can guide practitioners in developing IT solutions aligned with policy drivers, technological capabilities, care delivery needs, and organizational imperatives. Recommendations for Researchers. The conceptual framework developed in this study offers a lens for researchers across disciplines to continue investigating the role of information technology in the healthcare industry. Impact on Society. Examining the evolution of IT in the healthcare industry revealed the importance of information technology in enhancing the delivery and affordability of healthcare services and addressing issues of accessibility and inequality. Future Research. Future research will explore global perspectives showcasing the successful impact of IT on healthcare, as emerging technologies impact healthcare delivery and patient outcomes.




information

Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]

Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together.




information

TQM for Information Systems: Are Indian Organizations Ready?




information

Integrated Information Systems - A Challenge for Long-Term Digital Preservation




information

The Technology Ownership and Information Acquisition Habits of HBCU Freshmen




information

Information Retrieval Systems: A Human Centered Approach




information

Framework for Quality Metrics in Mobile-Wireless Information Systems




information

A Guided Approach for Personalized Information Search and Visualization




information

Decision Making for Predictive Maintenance in Asset Information Management




information

Information Quality and Absorptive Capacity in Service and Product Innovation Processes




information

Adaptive Innovation and a MOODLE-based VLE to Support a Fully Online MSc Business Information Technology (BIT) at the University of East London (UEL)




information

Can We Help Information Systems Students Improve Their Ethical Decision Making?




information

Generativity: The New Frontier for Information and Communication Technology Literacy




information

A Return on Investment as a Metric for Evaluating Information Systems: Taxonomy and Application




information

A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research




information

Barriers to the Effective Deployment of Information Assets: An Executive Management Perspective




information

A Comparison of International Information Security Regulations




information

The Survey of Information Systems in Public Administration in Poland




information

Change management in information systems projects for public organizations

It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work.




information

Challenges of Knowledge and Information Management during New Product Introduction: Experiences from a Finnish Multinational Company

Efficient knowledge and information management is essential for companies to prosper in the rapidly changing global environment. This article presents challenges of a large Finnish multinational company relating to their current knowledge and information management practices and systems. The focus is on New Product Introduction (NPI) process. The study is based on interviews and facilitated workshops in the Research and Development (R&D) and Production departments. Furthermore, the identified challenges are reflected to the findings presented in knowledge and information management literature. The results gained from the company case study were well in line with the findings in the literature. Three main topics, which can be generalized to cause challenges for knowledge and information management in most companies, were recognized: 1) Issues related to human behavior, individual characteristics and capabilities, different backgrounds, and professional vocabulary; 2) Codifying tacit knowledge into explicit information, which can be saved to company information system; 3) Lack of interoperability between different information systems. The study provides the management of the case company, and other similar organizations, focus points while seeking for better knowledge and information management. From a scientific perspective, the main contribution of this article is to give practical examples of how the theoretical findings presented in literature manifest themselves in real industrial practices.




information

Accounting Information Systems Effectiveness: Evidence from the Nigerian Banking Sector

Aim/Purpose: The purpose of this study is to investigate the interrelationship among the quality measures of information system success, including system quality, information, quality, and service quality, that eventually influence accounting information systems effectiveness. Background: It is generally believed that investment in an information system offers opportunities to organizations for business process efficiency and effectiveness. Despite huge investments in accounting information systems, banks in Nigeria have not realized the full potential benefits of using these systems because of persistent failures. Few studies have been conducted to address the problem. Methodology: A survey research design was used to collect data, and a total of 287 questionnaires were retrieved from respondents in the Nigerian banking sector. Contribution: This study contributes to the understanding of the most important antecedent factors of the quality measures, the interrelationship among the quality measures, and the influence of these measures on the accounting information systems effectiveness. Findings: The result of the study revealed that security, ease of use, and efficiency are key features of system quality, while the information quality dimension includes accuracy, timeliness, and completeness. The result of the study further revealed that information quality and system quality have significant influences on accounting information systems effectiveness. Recommendations for Practitioners: This study provides practitioners with important measures for evaluation of AIS effectiveness in the context of Nigerian banks. Recommendation for Researchers: Future researchers may build on the findings of current study to conduct fur-ther research in the area of AIS effectiveness in different contexts. Future Research: This study examines only three quality measures of Delone and Mclean model and antecedents of information and system quality measures, neglecting contingency factor. Therefore, future study should include other factors to the AIS effectiveness model to help in developing more specific theory in AIS domain.




information

Understanding Internal Information Systems Security Policy Violations as Paradoxes

Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful.




information

A Thematic Analysis of Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM)

Aim/Purpose: This study investigates the research profile of the papers published in Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM) to provide silhouette information of the journal for the editorial team, researchers, and the audience of the journal. Background: Information and knowledge management is an interdisciplinary subject. IJIKM defines intersections of multiple disciplinary research communities for the interdisciplinary subject. Methodology: A quantitative study of categorical content analysis was used for a thematic analysis of IJIKM. One hundred fifty nine (159) papers published since the inauguration of the journal in 2006 were coded and analyzed. Contribution: The study provides synopsized information about the interdisciplinary research profile of IJIKM, and adds value to the literature of information and knowledge management. Findings: The analysis reveals that IJIKM disseminates research papers with a wide range of research themes. Among the research themes, Organizational issues of knowledge/information management, Knowledge management systems/tools, Information/knowledge sharing, Technology for knowledge/information management, Information/knowledge application represent the five main research streams of IJIKM. The total number of papers on organizational issues of knowledge/information management increased from 16% to 28% during the past 6 years. Statistical method was the most common research methodology, and summarization was the most common research design applied in the papers of IJIKM. The paper also presents other patterns of participant countries, keywords frequencies, and reference citations. Recommendations for Practitioners: Innovation is the key to information and knowledge management. Practitioners of information and knowledge management can share best practices with external sectors. Recommendation for Researchers: Researchers can identify opportunities of cross-disciplinary research projects that involve experts in business, education, government, healthcare, technology, and psychology to advance knowledge in information and knowledge management. Impact on Society: Information and knowledge management is still a developing field, and readers of this paper can gain more understanding of the dissemination of the literature of information and knowledge management involved in all relevant disciplines. Future Research: A longitudinal study could follow up in the future to provide updated and comparative information of the research profile of the journal.




information

The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector

Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems.




information

Information Technology Capabilities and SMEs Performance: An Understanding of a Multi-Mediation Model for the Manufacturing Sector

Aim/Purpose: Despite the fact that the plethora of studies demonstrate the positive impact of information technology (IT) capabilities on SMEs performance, the understanding of underlying mechanisms through which IT capabilities affect the firm performance is not yet clear. This study fills these gaps by explaining the roles of absorptive capacity and corporate entrepreneurship. The study also elaborates the effect of IT capability dimensions (IT integration and IT alignment) upon the SMEs performance outcomes through the mediating sequential process of absorptive capacity and corporate entrepreneurship. Methodology: This study empirically tests a theoretical model based on the Dynamic Capability View (DCV), by using the partial least square (PLS) technique with a sample of 489 manufacturing SMEs in Pakistan. A survey is employed for the data collection by following the cluster sampling approach. Contribution: This research contributes to the literature of IT by bifurcating the IT capability into two dimensions, IT integration and IT alignment, which allows us to distinguish between different sources of IT capabilities. Additionally, our findings shed the light on the dynamic capability view by theoretically and empirically demonstrating how absorptive capacity and corporate entrepreneurship sequentially affect the firms' performance outcomes. At last, this study contributes to the literature of SMEs by measuring the two levels of performance: innovation performance and firm performance. Findings: The results of the analysis show that the absorptive capacity and the corporate entrepreneurship significantly mediate the relationship between both dimensions of IT capability and performance outcomes.




information

The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel

Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter.




information

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




information

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




information

Determinants of Knowledge Transfer for Information Technology Project Managers: A Systematic Literature Review

Aim/Purpose: The purpose of this study is to identify the key determinants hindering Knowledge Transfer (KT) practices for Information Technology Project Managers (ITPMs) Background: The failure rate of IT projects remains unacceptably high worldwide, and KT between project managers and team members has been recognized as a significant issue affecting project success. Therefore, this study tries to identify the determinants of KT within the context of IT projects for ITPMs. Methodology: A systematic review of the literature (SLR) was employed in the investigation. The SLR found 28 primary studies on KT for ITPMs that were published in Scopus and Web of Science databases between 2010 and 2023. Contribution: Social Cognitive Theory (SCT) was used to build a theoretical framework where the determinants were categorized into Personal factors, Environmental (Project organizational) factors, and other factors, such as Technological factors influencing ITPMs (Behavioral factors), to implement in KT practices. Findings: The review identified 11 key determinants categorized into three broad categories: Personal factors (i.e., motivation, absorptive capability, trust, time urgency), Project Organizational factors (i.e., team structure, leadership style, reward system, organizational culture, communication), and Technological factors (i.e., project task collaboration tool and IT infrastructure and support) that influence implementing KT for ITPMs Recommendations for Practitioners: The proposed framework in this paper can be used by project managers as a guide to adopt KT practices within their project organization. Recommendation for Researchers: The review showed that some determinants, such as Technological factors, have not been adequately explored in the existing KT model in the IT projects context and can be integrated with other relevant theories to understand how a project manager’s knowledge can be transferred and retained in the organization using technology in future research. Impact on Society: This study emphasizes the role of individual actions and project organizational and technological matters in shaping the efficacy of KT within project organizations. It offers insight that could steer business owners or executives within project organizations to closely observe the behavior of project managers, thereby securing successful project outcomes. Future Research: The determinant list provided in this paper is acquired from extensive SLR and, therefore, further research should aim to expand and deepen the investigation by validating these determinants from experts in the field of IT and project management. Future studies can also add other external technological determinants to provide a more comprehensive KT implementation framework. Similarly, this research does not include determinants identified directly from the industry, as it relies solely on determinants found in the existing literature. Although a comprehensive attempt has been made to encompass all relevant papers, there remains a potential for overlooking some research in this process.




information

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




information

The Influence of COVID-19 on Employees’ Use of Organizational Information Systems

Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis.




information

How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data

Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns. Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors. Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality. Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables. Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor. Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy. Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor.




information

The Relationship Between Electronic Word-of-Mouth Information, Information Adoption, and Investment Decisions of Vietnamese Stock Investors

Aim/Purpose: This study investigates the relationship between Electronic Word-of-Mouth (EWOM), Information Adoption, and the stock investment of Vietnamese investors. Background: Misinformation spreads online, and a lack of strong information analysis skills can lead Vietnamese investors to make poor stock choices. By understanding how online conversations and information processing influence investment decisions, this research can help investors avoid these pitfalls. Methodology: This study applies Structural Equation Modelling (SEM) to investigate how non-professional investors react to online information and which information factors influence their investment decisions. The final sample includes 512 investors from 18 to 65 years old from various professional backgrounds (including finance, technology, education, etc.). We conducted a combined online and offline survey using a convenience sampling method from August to November 2023. Contribution: This study contributes to the growing literature on Electronic Word-of-Mouth (EWOM) and its impact on investment decisions. While prior research has explored EWOM in various contexts, we focus on Vietnamese investors, which can offer valuable insights into its role within a developing nation’s stock market. Investors, particularly those who are new or less experienced, are often susceptible to the influence of EWOM. By examining EWOM’s influence in Vietnam, this study sheds light on a crucial factor impacting investment behavior in this emerging market. Findings: The results show that EWOM has a moderate impact on the Information Adoption and investment decisions of Vietnamese stock investors. Information Quality (QL) is the factor that has the strongest impact on Information Adoption (IA), followed by Information Credibility (IC) and Attitude Towards Information (AT). Needs for Information (NI) only have a small impact on Information Adoption (IA). Finally, Information Adoption (IA) has a limited influence on investor decisions in stock investment. We also find that investors need to verify information through official sites before making investment decisions based on posts in social media groups. Recommendations for Practitioners: The findings suggest that state management and media agencies need to coordinate to improve the quality of EWOM information to protect investors and promote the healthy development of the stock market. Social media platform managers need to moderate content, remove false information, prioritize displaying authentic information, cooperate with experts, provide complete information, and personalize the experience to enhance investor trust and positive attitude. Securities companies need to provide complete, accurate, and updated information about the market and investment products. They can enhance investor trust and positive attitude by developing news channels, interacting with investors, and providing auxiliary services. Listed companies need to take the initiative to improve the quality of information disclosure and ensure clarity, comprehensibility, and regular updates. Use diverse communication channels and improve corporate governance capacity to increase investor trust and positive attitude. Investors need to seek information from reliable sources, compare information from multiple sources, and carefully check the source and author of the information. They should improve their investment knowledge and skills, consult experts, define investment goals, and build a suitable investment portfolio. Recommendation for Researchers: This study synthesized previous research on EWOM, but there is still a gap in the field of securities because each nation has its laws, regulations, and policies. The relationships between the factors in the model are not yet clear, and there is a need to develop a model with more interactive factors. The research results need to be further verified, and more research can be conducted on the influence of investor psychology, investment experience, etc. Impact on Society: This study finds that online word-of-mouth (EWOM) can influence Vietnamese investors’ stock decisions, but information quality is more important. Policymakers should regulate EWOM accuracy, fund managers should use social media to reach investors, and investors should diversify their information sources. Future Research: This study focuses solely on the stock market, while individual investors in Vietnam may engage in various other investment forms such as gold, real estate, or cryptocurrencies. Therefore, future research could expand the scope to include other investment types to gain a more comprehensive understanding of how individual investors in Vietnam utilize electronic word-of-mouth (EWOM) and adopt information in their investment decision-making process. Furthermore, while these findings may apply to other emerging markets with similar levels of financial literacy as Vietnam, they may not fully extend to countries with higher financial literacy rates. Hence, further studies could be conducted in developed countries to examine the generalizability of these findings. Finally, future research could see how EWOM’s impact changes over a longer period. Additionally, a more nuanced understanding of the information adoption process could be achieved by developing a research model with additional factors.




information

Learning-Based Models for Building User Profiles for Personalized Information Access

Aim/Purpose: This study aims to evaluate the success of deep learning in building user profiles for personalized information access. Background: To better express document content and information during the matching phase of the information retrieval (IR) process, deep learning architectures could potentially offer a feasible and optimal alternative to user profile building for personalized information access. Methodology: This study uses deep learning-based models to deduce the domain of the document deemed implicitly relevant by a user that corresponds to their center of interest, and then used predicted domain by the best given architecture with user’s characteristics to predict other centers of interest. Contribution: This study contributes to the literature by considering the difference in vocabulary used to express document content and information needs. Users are integrated into all research phases in order to provide them with relevant information adapted to their context and their preferences meeting their precise needs. To better express document content and information during this phase, deep learning models are employed to learn complex representations of documents and queries. These models can capture hierarchical, sequential, or attention-based patterns in textual data. Findings: The results show that deep learning models were highly effective for building user profiles for personalized information access since they leveraged the power of neural networks in analyzing and understanding complex patterns in user behavior, preferences, and user interactions. Recommendations for Practitioners: Building effective user profiles for personalized information access is an ongoing process that requires a combination of technology, user engagement, and a commitment to privacy and security. Recommendation for Researchers: Researchers involved in building user profiles for personalized information access play a crucial role in advancing the field and developing more innovative deep-based networks solutions by exploring novel data sources, such as biometric data, sentiment analysis, or physiological signals, to enhance user profiles. They can investigate the integration of multimodal data for a more comprehensive understanding of user preferences. Impact on Society: The proposed models can provide companies with an alternative and sophisticated recommendation system to foster progress in building user profiles by analyzing complex user behavior, preferences, and interactions, leading to more effective and dynamic content suggestions. Future Research: The development of user profile evolution models and their integration into a personalized information search system may be confronted with other problems such as the interpretability and transparency of the learning-based models. Developing interpretable machine learning techniques and visualization tools to explain how user profiles are constructed and used for personalized information access seems necessary to us as a future extension of our work.




information

Using Social Media Applications for Accessing Health-related Information: Evidence from Jordan

Aim/Purpose: This study examined the use of Social Media Applications (SMAs) for accessing health-related information within a heterogeneous population in Jordan. The objective of this study was therefore threefold: (i) to investigate the usage of SMAs, including WhatsApp, Twitter, YouTube, Snapchat, Instagram, and Facebook, for accessing health-related information; (ii) to examine potential variations in the use of SMAs based on demographic and behavioral characteristics; and (iii) to identify the factors that can predict the use of SMAs. Background: There has been limited focus on investigating the behavior of laypeople in Jordan when it comes to seeking health information from SMAs. Methodology: A cross-sectional study was conducted among the general population in Jordan using an online questionnaire administered to 207 users. A purposive sampling technique was employed, wherein all the participants actively sought online health information. Descriptive statistics, t-tests, and regression analyses were utilized to analyze the collected data. Contribution: This study adds to the existing body of research on health information seeking from SMAs in developing countries, with a specific focus on Jordan. Moreover, laypeople, often disregarded by researchers and health information providers, are the most vulnerable individuals who warrant greater attention. Findings: The findings indicated that individuals often utilized YouTube as a platform to acquire health-related information, whereas their usage of Facebook for this purpose was less frequent. Participants rarely utilized Instagram and WhatsApp to obtain health information, while Twitter and Snapchat were very seldom used for this purpose. The variable of sex demonstrated a notable positive correlation with the utilization of YouTube and Twitter for the purpose of finding health-related information. Conversely, the variable of nationality exhibited a substantial positive correlation with the utilization of Facebook, Instagram, and Twitter. Consulting medical professionals regarding information obtained from the Internet was a strong indicator of using Instagram to search for health-related information. Recommendations for Practitioners: Based on the empirical results, this study provides feasible recommendations for the government, healthcare providers, and developers of SMAs. Recommendation for Researchers: Researchers should conduct separate investigations for each application specifically pertaining to the acquisition of health-related information. Additionally, it is advisable to investigate additional variables that may serve as predictors for the utilization of SMAs. Impact on Society: The objective of this study is to enhance the inclination of the general public in Jordan to utilize SMAs for health-related information while also maximizing the societal benefits of these applications. Future Research: Additional research is required to examine social media’s usability (regarding ease of use) and utility (comparing advantages to risks) in facilitating effective positive change and impact in healthcare.




information

International Journal of Information and Operations Management Education




information

Modeling the Organizational Aspects of Learning Objects in Semantic Web Approaches to Information Systems




information

Decoupling the Information Application from the Information Creation: Video as Learning Objects in Three-Tier Architecture




information

Quality Metrics for PDA-based M-Learning Information Systems




information

Designing Online Information Aggregation and Prediction Markets for MBA Courses




information

The Impact of Learning with Laptops in 1:1 Classes on the Development of Learning Skills and Information Literacy among Middle School Students




information

What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability?




information

ICT Use: Educational Technology and Library and Information Science Students' Perspectives – An Exploratory Studyew Article

This study seeks to explore what factors influence students’ ICT use and web technology competence. The objectives of this study are the following: (a) To what extent do certain elements of Rogers’ (2003) Diffusion of Innovations Theory (DOI) explain students’ ICT use, (b) To what extent do personality characteristics derived from the Big Five approach explain students’ ICT use, and (c) To what extent does motivation explain students’ ICT use. The research was conducted in Israel during the second semester of the academic year 2013-14, and included two groups of participants: a group of Educational Technology students (ET) and a group of Library and Information Science students (LIS). Findings add another dimension to the importance of Rogers’ DOI theory in the fields of Educational Technology and Library and Information Science. Further, findings confirm that personality characteristics as well as motivation affect ICT use. If instructors would like to enhance students’ ICT use, they should be aware of individual differences between students, and they should present to students the advantages and usefulness of ICT, thus increasing their motivation to use ICT, in the hopes that they will become innovators or early adopters.




information

Making Sense of the Information Seeking Process of Undergraduates in a Specialised University: Revelations from Dialogue Journaling on WhatsApp Messenger

Aim/Purpose: The research work investigated the information seeking process of undergraduates in a specialised university in Nigeria, in the course of a group assignment. Background: Kuhlthau’s Information Search Process (ISP) model is used as lens to reveal how students interact with information in the affective, cognitive and physical realms. Methodology: Qualitative research methods were employed. The entire seventy-seven third year students in the Department of Petroleum and Natural Gas and their course lecturer were the participants. Group assignment question was analysed using Bloom’s Taxonomy while the information seeking process of the students was garnered through dialogue journaling on WhatsApp Messenger. Contribution: The research explicates how students’ information seeking behaviour can be captured beyond the four walls of a classroom by using a Web 2.0 tool such as WhatsApp Messenger. Findings: The apparent level of uncertainty, optimism, and confusion/doubt common in the initiation, selection, and exploration phases of the ISP model and low confidence levels were not markedly evident in the students. Consequently, Kuhlthau’s ISP model could not be applied in its entirety to the study’s particular context of teaching and learning due to the nature of the assignment. Recommendations for Practitioners: The study recommends that the Academic Planning Unit (APU) should set a benchmark for all faculties and, by extension, the departments in terms of the type/scope and number of assignments per semester, including learning outcomes. Recommendation for Researchers: Where elements of a guided approach to learning are missing, Kuhlthau’s ISP may not be employed. Therefore, alternative theory, such as Theory of Change could explain the poor quality of education and the type of intervention that could enhance students’ learning. Impact on Society: The ability to use emerging technologies is a form of literacy that is required by the 21st century work place. Hence, the study demonstrates students’ adaptation to emerging technology. Future Research: The study is limited to only one case site. It would be more helpful to the Nigerian society to have this study extended to other universities for the purpose of generalisation and appropriate intervention.




information

Addressing Information Literacy and the Digital Divide in Higher Education

Aim/Purpose: The digital divide and educational inequalities remain a significant societal problem in the United States, and elsewhere, impacting low income, first-generation, and minority learners. Accordingly, institutions of higher education are challenged to meet the needs of students with varying levels of technological readiness with deficiencies in information and digital literacy shown to be a hindrance to student success. This paper documents the efforts of a mid-Atlantic minority-serving institution as it seeks to assess, and address, the digital and information literacy skills of underserved students Background: A number of years ago, a historically Black university in Maryland developed an institutional commitment to the digital and information literacy of their students. These efforts have included adoption of an international certification exam used as a placement test for incoming freshmen; creation of a Center for Student Technology Certification and Training; course redesign, pre and post testing in computer applications courses; and a student perception survey. Methodology: A multi-methodological approach was applied in this study which relied on survey results, pre and post testing of students enrolled in introductory and intermediate computer applications courses, and scores from five years of placement testing. Student pre and post test scores were compared in order to examine degree of change, and post test scores were also assessed against five years of scores from the same test used as a placement for incoming freshmen. Finally, a student perception and satisfaction survey was administered to all students enrolled in the courses under consideration. The survey included a combination of dichotomous, Likert-scaled, and ranking questions and was administered electronically. The data was subsequently exported to Microsoft Excel and SPSS where descriptive statistical analyses were conducted. Contribution: This study provides research on a population (first-generation minority college students) that is expanding in numbers in higher education and that the literature reports as being under-prepared for academic success. Unfortunately, there is a paucity of current studies examining the information and technological readiness of students specifically enrolled at minority serving institutions. As such, this paper is timely and relevant and helps to extend our discourse on the digital divide and technological readiness as it impacts higher education. The students included in this study are representative of those enrolled in Historically Black Colleges or Universities (HBCUs) in the United States, giving this paper broad implications across the country. Internationally, most countries have populations of first-generation college students from under-served populations for whom a lack of digital readiness is an also an issue therefore giving this study a global relevance. Findings: The digital divide is a serious concern for higher education, especially as schools seek to increasingly reach out to underserved populations. In particular, the results of this study show that students attending a minority serving institution do not come to college with the technology skills needed for academic success. Pre and post testing of students, as well as responses to survey questions, have proven the efficacy of computer applications courses at building the technology skills of students. These courses are viewed overwhelmingly positive by students with respondents reporting that they are a necessary part of the college experience that benefits them academically and professionally. Use of an online simulated learning and assessment system with immediate automated feedback and remediation was also found to be particularly effective at building the computer and information literacy skills of students. The total sample size for this study was over 2,800 individuals as data from 2690 IC3 tests administered over a five year period were considered, as well as 160 completed surveys, and pre and post testing of 103 students. Recommendations for Practitioners: Institutions of higher education should invest in a thorough examination of the information and technology literacy skills, needs, and perceptions of students both coming into the institution as well as following course completion. Recommendation for Researchers: This research should be expanded to more minority serving institutions across the United States as well as abroad. This particular research protocol is easily replicated and can be duplicated at both minority and majority serving institutions enabling greater comparisons across groups. Impact on Society: The results of this research help to shed light on a problem that desperately needs to be addressed by institutions of higher education, which is the realities of the digital divide and the under preparedness of entering college students in particular those who are from low income, first generation, and minority groups Future Research: A detailed quantitative survey study is being conducted that seeks to examine the technology uses, backgrounds, needs, interests, career goals, and professional expectations with respect to a range of currently relevant technologies.




information

Positive vs. Negative Framing of Scientific Information on Facebook Using Peripheral Cues: An Eye-Tracking Study of the Credibility Assessment Process

Aim/Purpose: To examine how positive/negative message framing – based on peripheral cues (regarding popularity, source, visuals, and hyperlink) – affects perceptions of credibility of scientific information posted on social networking sites (in this case, Facebook), while exploring the mechanisms of viewing the different components. Background: Credibility assessment of information is a key skill in today's information society. However, it is a demanding cognitive task, which is impossible to perform for every piece of online information. Additionally, message framing — that is, the context and approach used to construct information— may impact perceptions of credibility. In practice, people rely on various cues and cognitive heuristics to determine whether they think a piece of content is true or not. In social networking sites, content is usually enriched by additional information (e.g., popularity), which may impact the users' perceived credibility of the content. Methodology: A quantitative controlled experiment was designed (N=19 undergraduate students), collecting fine grained data with an eye tracking camera, while analyzing it using transition graphs. Contribution: The findings on the mechanisms of that process, enabled by the use of eye tracking data, point to the different roles of specific peripheral cues, when the message is overall peripherally positive or negative. It also contributes to the theoretical literature on framing effects in science communication, as it highlights the peripheral cues that make a strong frame. Findings: The positively framed status was perceived, as expected from the Elaboration Likelihood Model, more credible than the negatively framed status, demonstrating the effects of the visual framing. Differences in participants' mechanisms of assessing credibility between the two scenarios were evident in the specific ways the participants examined the various status components. Recommendations for Practitioners: As part of digital literacy education, major focus should be given to the role of peripheral cues on credibility assessment in social networking sites. Educators should emphasize the mechanisms by which these cues interact with message framing, so Internet users would be encouraged to reflect upon their own credibility assessment skills, and eventually improve them. Recommendation for Researchers: The use of eye tracking data may help in collecting and analyzing fine grained data on credibility assessment processes, and on Internet behavior at large. The data shown here may shed new light on previously studied phenomena, enabling a more nuanced understanding of them. Impact on Society: In an era when Internet users are flooded with information that can be created by virtually anyone, credibility assessment skills have become ever more important, hence the prominence of this skill. Improving citizens' assessment of information credibility — to which we believe this study contributes — results on a greater impact on society. Future Research: The role of peripheral cues and of message framing should be studied in other contexts (not just scientific news) and in other platforms. Additional peripheral cues not tested here should be also taken into consideration (e.g., connections between the information consumer and the information sharer, or the type of the leading image).




information

Practical Liability Issues of Information Technology Education: Internship and Consulting Engagements




information

Matching Office Information Systems (OIS) Curriculum To Relevant Standards: Students, School Mission, Regional Business Needs, and National Curriculum




information

Conceptions of an Information System and Their Use in Teaching about IS