inform Integrated Information Systems - A Challenge for Long-Term Digital Preservation By Published On :: Full Article
inform The Technology Ownership and Information Acquisition Habits of HBCU Freshmen By Published On :: Full Article
inform Framework for Quality Metrics in Mobile-Wireless Information Systems By Published On :: Full Article
inform A Guided Approach for Personalized Information Search and Visualization By Published On :: Full Article
inform Decision Making for Predictive Maintenance in Asset Information Management By Published On :: Full Article
inform Information Quality and Absorptive Capacity in Service and Product Innovation Processes By Published On :: Full Article
inform Adaptive Innovation and a MOODLE-based VLE to Support a Fully Online MSc Business Information Technology (BIT) at the University of East London (UEL) By Published On :: Full Article
inform Can We Help Information Systems Students Improve Their Ethical Decision Making? By Published On :: Full Article
inform Generativity: The New Frontier for Information and Communication Technology Literacy By Published On :: Full Article
inform Simulation Modeling of an Iron Ore Operation to Enable Informed Planning By Published On :: Full Article
inform A Return on Investment as a Metric for Evaluating Information Systems: Taxonomy and Application By Published On :: Full Article
inform A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research By Published On :: Full Article
inform Barriers to the Effective Deployment of Information Assets: An Executive Management Perspective By Published On :: Full Article
inform A Comparison of International Information Security Regulations By Published On :: Full Article
inform The Survey of Information Systems in Public Administration in Poland By Published On :: Full Article
inform Change management in information systems projects for public organizations By Published On :: 2015-08-02 It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work. Full Article
inform Challenges of Knowledge and Information Management during New Product Introduction: Experiences from a Finnish Multinational Company By Published On :: 2016-10-31 Efficient knowledge and information management is essential for companies to prosper in the rapidly changing global environment. This article presents challenges of a large Finnish multinational company relating to their current knowledge and information management practices and systems. The focus is on New Product Introduction (NPI) process. The study is based on interviews and facilitated workshops in the Research and Development (R&D) and Production departments. Furthermore, the identified challenges are reflected to the findings presented in knowledge and information management literature. The results gained from the company case study were well in line with the findings in the literature. Three main topics, which can be generalized to cause challenges for knowledge and information management in most companies, were recognized: 1) Issues related to human behavior, individual characteristics and capabilities, different backgrounds, and professional vocabulary; 2) Codifying tacit knowledge into explicit information, which can be saved to company information system; 3) Lack of interoperability between different information systems. The study provides the management of the case company, and other similar organizations, focus points while seeking for better knowledge and information management. From a scientific perspective, the main contribution of this article is to give practical examples of how the theoretical findings presented in literature manifest themselves in real industrial practices. Full Article
inform Doing the Organizational Tango: Symbiotic Relationship between Formal and Informal Organizational Structures for an Agile Organization By Published On :: 2016-04-12 This paper reports on research with a broad objective to examine the relationship between two organizational entities, the formally structured organization and informal organizational structures, in a changing operational environment, more specifically during military deployments. The paper draws on organizational and complexity paradigms; based on empirical evidence obtained through qualitative techniques, it describes mechanisms that enable a symbiotic relationship between these two organizational structures in a complex operational landscape. Substantive findings provide insights into the dynamics of the interactions between these structures and illuminate the relationship between three enabling factors – accountability, responsible autonomy, and command and control arrangements – that need to be considered to fully exploit the strengths inherent in both formal and informal structures. Based on these findings, a model for enhancement of organizational agility in response to changes in a complex operational environment is described. The model is predicated on feedback and mutual adjustment of the organization, institution and individual through sensemaking; it illustrates the dynamic nature of interactions that are required for such a response. Full Article
inform Accounting Information Systems Effectiveness: Evidence from the Nigerian Banking Sector By Published On :: 2017-12-04 Aim/Purpose: The purpose of this study is to investigate the interrelationship among the quality measures of information system success, including system quality, information, quality, and service quality, that eventually influence accounting information systems effectiveness. Background: It is generally believed that investment in an information system offers opportunities to organizations for business process efficiency and effectiveness. Despite huge investments in accounting information systems, banks in Nigeria have not realized the full potential benefits of using these systems because of persistent failures. Few studies have been conducted to address the problem. Methodology: A survey research design was used to collect data, and a total of 287 questionnaires were retrieved from respondents in the Nigerian banking sector. Contribution: This study contributes to the understanding of the most important antecedent factors of the quality measures, the interrelationship among the quality measures, and the influence of these measures on the accounting information systems effectiveness. Findings: The result of the study revealed that security, ease of use, and efficiency are key features of system quality, while the information quality dimension includes accuracy, timeliness, and completeness. The result of the study further revealed that information quality and system quality have significant influences on accounting information systems effectiveness. Recommendations for Practitioners: This study provides practitioners with important measures for evaluation of AIS effectiveness in the context of Nigerian banks. Recommendation for Researchers: Future researchers may build on the findings of current study to conduct fur-ther research in the area of AIS effectiveness in different contexts. Future Research: This study examines only three quality measures of Delone and Mclean model and antecedents of information and system quality measures, neglecting contingency factor. Therefore, future study should include other factors to the AIS effectiveness model to help in developing more specific theory in AIS domain. Full Article
inform Understanding Internal Information Systems Security Policy Violations as Paradoxes By Published On :: 2017-01-17 Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful. Full Article
inform The Mechanism of Internet Capability Driving Knowledge Creation Performance: The Effects of Strategic Flexibility and Informatization Density By Published On :: 2018-09-01 Aim/Purpose: This study analyzes the mechanism of Internet capability (IC) driving knowledge creation performance (KCP). We consider the mediating role of strategic flexibility and the moderating role of informatization density. Background: The key to achieving KCP for firms is to transform knowledge created into new products or services and to realize the economic benefits. However, the research has not paid enough attention to firms’ KCP. Based on dynamic capability theory, this study empirically reveals how firms drive KCP through Internet capability. Methodology: The study uses survey data from 399 organizations in China. Through structural equation modeling, this study assesses the relationship between Internet capability, strategic flexibility, and KCP and uses hierarchical regression to test the moderating role of informatization density. Contribution: First, this study expands research on knowledge creation and focuses on the further achievement of knowledge creation performance. The study also enriches the exploration of KCP in the Internet context and deepens the research on the internal mechanism by which Internet capability influences KCP. Second, this study highlights the important role of informatization density in the Internet context and expands the research on the impact of external factors on the internal mechanism. Findings: First, Internet capability has a significantly positive effect on both strategic flexibility and KCP. Furthermore, Internet capability directly impacts strategic flexibility, yet it affects KCP both directly and indirectly through strategic flexibility, which confirms that strategic flexibility is a partial mediator in the relationship between Internet capability and KCP. Second, strategic flexibility positively influences KCP. Third, informatization density has a significant moderating effect on the relationship between Internet capability and KCP. Recommendations for Practitioners: The results indicate that firms should consider the importance of Internet capability and strategic flexibility for KCP in the Internet context. This study also provides a theoretical basis that could guide the Chinese government’s informatization construction of the industrial chain. Recommendation for Researchers: Researchers could further explore the role of other mediator variables (e.g., business process management, organizational agility) and consider the role of other moderator variables (e.g., resource commitment, learning orientation). Impact on Society: This study provides a reference for enterprises with similar cultural backgrounds in using Internet capability to enhance their competitive advantage. Future Research: Future research could collect data from various countries and regions to test the research model and conduct longitudinal studies to increase the robustness of the conclusions. Full Article
inform A Thematic Analysis of Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM) By Published On :: 2018-08-02 Aim/Purpose: This study investigates the research profile of the papers published in Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM) to provide silhouette information of the journal for the editorial team, researchers, and the audience of the journal. Background: Information and knowledge management is an interdisciplinary subject. IJIKM defines intersections of multiple disciplinary research communities for the interdisciplinary subject. Methodology: A quantitative study of categorical content analysis was used for a thematic analysis of IJIKM. One hundred fifty nine (159) papers published since the inauguration of the journal in 2006 were coded and analyzed. Contribution: The study provides synopsized information about the interdisciplinary research profile of IJIKM, and adds value to the literature of information and knowledge management. Findings: The analysis reveals that IJIKM disseminates research papers with a wide range of research themes. Among the research themes, Organizational issues of knowledge/information management, Knowledge management systems/tools, Information/knowledge sharing, Technology for knowledge/information management, Information/knowledge application represent the five main research streams of IJIKM. The total number of papers on organizational issues of knowledge/information management increased from 16% to 28% during the past 6 years. Statistical method was the most common research methodology, and summarization was the most common research design applied in the papers of IJIKM. The paper also presents other patterns of participant countries, keywords frequencies, and reference citations. Recommendations for Practitioners: Innovation is the key to information and knowledge management. Practitioners of information and knowledge management can share best practices with external sectors. Recommendation for Researchers: Researchers can identify opportunities of cross-disciplinary research projects that involve experts in business, education, government, healthcare, technology, and psychology to advance knowledge in information and knowledge management. Impact on Society: Information and knowledge management is still a developing field, and readers of this paper can gain more understanding of the dissemination of the literature of information and knowledge management involved in all relevant disciplines. Future Research: A longitudinal study could follow up in the future to provide updated and comparative information of the research profile of the journal. Full Article
inform The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector By Published On :: 2018-02-10 Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems. Full Article
inform Information Technology Capabilities and SMEs Performance: An Understanding of a Multi-Mediation Model for the Manufacturing Sector By Published On :: 2019-09-09 Aim/Purpose: Despite the fact that the plethora of studies demonstrate the positive impact of information technology (IT) capabilities on SMEs performance, the understanding of underlying mechanisms through which IT capabilities affect the firm performance is not yet clear. This study fills these gaps by explaining the roles of absorptive capacity and corporate entrepreneurship. The study also elaborates the effect of IT capability dimensions (IT integration and IT alignment) upon the SMEs performance outcomes through the mediating sequential process of absorptive capacity and corporate entrepreneurship. Methodology: This study empirically tests a theoretical model based on the Dynamic Capability View (DCV), by using the partial least square (PLS) technique with a sample of 489 manufacturing SMEs in Pakistan. A survey is employed for the data collection by following the cluster sampling approach. Contribution: This research contributes to the literature of IT by bifurcating the IT capability into two dimensions, IT integration and IT alignment, which allows us to distinguish between different sources of IT capabilities. Additionally, our findings shed the light on the dynamic capability view by theoretically and empirically demonstrating how absorptive capacity and corporate entrepreneurship sequentially affect the firms' performance outcomes. At last, this study contributes to the literature of SMEs by measuring the two levels of performance: innovation performance and firm performance. Findings: The results of the analysis show that the absorptive capacity and the corporate entrepreneurship significantly mediate the relationship between both dimensions of IT capability and performance outcomes. Full Article
inform The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel By Published On :: 2020-07-02 Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter. Full Article
inform Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective By Published On :: 2021-08-07 Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS. Full Article
inform Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems By Published On :: 2022-07-26 Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed. Full Article
inform Determinants of Knowledge Transfer for Information Technology Project Managers: A Systematic Literature Review By Published On :: 2023-12-26 Aim/Purpose: The purpose of this study is to identify the key determinants hindering Knowledge Transfer (KT) practices for Information Technology Project Managers (ITPMs) Background: The failure rate of IT projects remains unacceptably high worldwide, and KT between project managers and team members has been recognized as a significant issue affecting project success. Therefore, this study tries to identify the determinants of KT within the context of IT projects for ITPMs. Methodology: A systematic review of the literature (SLR) was employed in the investigation. The SLR found 28 primary studies on KT for ITPMs that were published in Scopus and Web of Science databases between 2010 and 2023. Contribution: Social Cognitive Theory (SCT) was used to build a theoretical framework where the determinants were categorized into Personal factors, Environmental (Project organizational) factors, and other factors, such as Technological factors influencing ITPMs (Behavioral factors), to implement in KT practices. Findings: The review identified 11 key determinants categorized into three broad categories: Personal factors (i.e., motivation, absorptive capability, trust, time urgency), Project Organizational factors (i.e., team structure, leadership style, reward system, organizational culture, communication), and Technological factors (i.e., project task collaboration tool and IT infrastructure and support) that influence implementing KT for ITPMs Recommendations for Practitioners: The proposed framework in this paper can be used by project managers as a guide to adopt KT practices within their project organization. Recommendation for Researchers: The review showed that some determinants, such as Technological factors, have not been adequately explored in the existing KT model in the IT projects context and can be integrated with other relevant theories to understand how a project manager’s knowledge can be transferred and retained in the organization using technology in future research. Impact on Society: This study emphasizes the role of individual actions and project organizational and technological matters in shaping the efficacy of KT within project organizations. It offers insight that could steer business owners or executives within project organizations to closely observe the behavior of project managers, thereby securing successful project outcomes. Future Research: The determinant list provided in this paper is acquired from extensive SLR and, therefore, further research should aim to expand and deepen the investigation by validating these determinants from experts in the field of IT and project management. Future studies can also add other external technological determinants to provide a more comprehensive KT implementation framework. Similarly, this research does not include determinants identified directly from the industry, as it relies solely on determinants found in the existing literature. Although a comprehensive attempt has been made to encompass all relevant papers, there remains a potential for overlooking some research in this process. Full Article
inform How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia By Published On :: 2023-09-07 Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors. Full Article
inform The Influence of COVID-19 on Employees’ Use of Organizational Information Systems By Published On :: 2023-06-27 Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis. Full Article
inform How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data By Published On :: 2023-04-05 Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns. Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors. Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality. Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables. Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor. Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy. Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor. Full Article
inform The Relationship Between Electronic Word-of-Mouth Information, Information Adoption, and Investment Decisions of Vietnamese Stock Investors By Published On :: 2024-08-13 Aim/Purpose: This study investigates the relationship between Electronic Word-of-Mouth (EWOM), Information Adoption, and the stock investment of Vietnamese investors. Background: Misinformation spreads online, and a lack of strong information analysis skills can lead Vietnamese investors to make poor stock choices. By understanding how online conversations and information processing influence investment decisions, this research can help investors avoid these pitfalls. Methodology: This study applies Structural Equation Modelling (SEM) to investigate how non-professional investors react to online information and which information factors influence their investment decisions. The final sample includes 512 investors from 18 to 65 years old from various professional backgrounds (including finance, technology, education, etc.). We conducted a combined online and offline survey using a convenience sampling method from August to November 2023. Contribution: This study contributes to the growing literature on Electronic Word-of-Mouth (EWOM) and its impact on investment decisions. While prior research has explored EWOM in various contexts, we focus on Vietnamese investors, which can offer valuable insights into its role within a developing nation’s stock market. Investors, particularly those who are new or less experienced, are often susceptible to the influence of EWOM. By examining EWOM’s influence in Vietnam, this study sheds light on a crucial factor impacting investment behavior in this emerging market. Findings: The results show that EWOM has a moderate impact on the Information Adoption and investment decisions of Vietnamese stock investors. Information Quality (QL) is the factor that has the strongest impact on Information Adoption (IA), followed by Information Credibility (IC) and Attitude Towards Information (AT). Needs for Information (NI) only have a small impact on Information Adoption (IA). Finally, Information Adoption (IA) has a limited influence on investor decisions in stock investment. We also find that investors need to verify information through official sites before making investment decisions based on posts in social media groups. Recommendations for Practitioners: The findings suggest that state management and media agencies need to coordinate to improve the quality of EWOM information to protect investors and promote the healthy development of the stock market. Social media platform managers need to moderate content, remove false information, prioritize displaying authentic information, cooperate with experts, provide complete information, and personalize the experience to enhance investor trust and positive attitude. Securities companies need to provide complete, accurate, and updated information about the market and investment products. They can enhance investor trust and positive attitude by developing news channels, interacting with investors, and providing auxiliary services. Listed companies need to take the initiative to improve the quality of information disclosure and ensure clarity, comprehensibility, and regular updates. Use diverse communication channels and improve corporate governance capacity to increase investor trust and positive attitude. Investors need to seek information from reliable sources, compare information from multiple sources, and carefully check the source and author of the information. They should improve their investment knowledge and skills, consult experts, define investment goals, and build a suitable investment portfolio. Recommendation for Researchers: This study synthesized previous research on EWOM, but there is still a gap in the field of securities because each nation has its laws, regulations, and policies. The relationships between the factors in the model are not yet clear, and there is a need to develop a model with more interactive factors. The research results need to be further verified, and more research can be conducted on the influence of investor psychology, investment experience, etc. Impact on Society: This study finds that online word-of-mouth (EWOM) can influence Vietnamese investors’ stock decisions, but information quality is more important. Policymakers should regulate EWOM accuracy, fund managers should use social media to reach investors, and investors should diversify their information sources. Future Research: This study focuses solely on the stock market, while individual investors in Vietnam may engage in various other investment forms such as gold, real estate, or cryptocurrencies. Therefore, future research could expand the scope to include other investment types to gain a more comprehensive understanding of how individual investors in Vietnam utilize electronic word-of-mouth (EWOM) and adopt information in their investment decision-making process. Furthermore, while these findings may apply to other emerging markets with similar levels of financial literacy as Vietnam, they may not fully extend to countries with higher financial literacy rates. Hence, further studies could be conducted in developed countries to examine the generalizability of these findings. Finally, future research could see how EWOM’s impact changes over a longer period. Additionally, a more nuanced understanding of the information adoption process could be achieved by developing a research model with additional factors. Full Article
inform Learning-Based Models for Building User Profiles for Personalized Information Access By Published On :: 2024-04-30 Aim/Purpose: This study aims to evaluate the success of deep learning in building user profiles for personalized information access. Background: To better express document content and information during the matching phase of the information retrieval (IR) process, deep learning architectures could potentially offer a feasible and optimal alternative to user profile building for personalized information access. Methodology: This study uses deep learning-based models to deduce the domain of the document deemed implicitly relevant by a user that corresponds to their center of interest, and then used predicted domain by the best given architecture with user’s characteristics to predict other centers of interest. Contribution: This study contributes to the literature by considering the difference in vocabulary used to express document content and information needs. Users are integrated into all research phases in order to provide them with relevant information adapted to their context and their preferences meeting their precise needs. To better express document content and information during this phase, deep learning models are employed to learn complex representations of documents and queries. These models can capture hierarchical, sequential, or attention-based patterns in textual data. Findings: The results show that deep learning models were highly effective for building user profiles for personalized information access since they leveraged the power of neural networks in analyzing and understanding complex patterns in user behavior, preferences, and user interactions. Recommendations for Practitioners: Building effective user profiles for personalized information access is an ongoing process that requires a combination of technology, user engagement, and a commitment to privacy and security. Recommendation for Researchers: Researchers involved in building user profiles for personalized information access play a crucial role in advancing the field and developing more innovative deep-based networks solutions by exploring novel data sources, such as biometric data, sentiment analysis, or physiological signals, to enhance user profiles. They can investigate the integration of multimodal data for a more comprehensive understanding of user preferences. Impact on Society: The proposed models can provide companies with an alternative and sophisticated recommendation system to foster progress in building user profiles by analyzing complex user behavior, preferences, and interactions, leading to more effective and dynamic content suggestions. Future Research: The development of user profile evolution models and their integration into a personalized information search system may be confronted with other problems such as the interpretability and transparency of the learning-based models. Developing interpretable machine learning techniques and visualization tools to explain how user profiles are constructed and used for personalized information access seems necessary to us as a future extension of our work. Full Article
inform Using Social Media Applications for Accessing Health-related Information: Evidence from Jordan By Published On :: 2024-03-07 Aim/Purpose: This study examined the use of Social Media Applications (SMAs) for accessing health-related information within a heterogeneous population in Jordan. The objective of this study was therefore threefold: (i) to investigate the usage of SMAs, including WhatsApp, Twitter, YouTube, Snapchat, Instagram, and Facebook, for accessing health-related information; (ii) to examine potential variations in the use of SMAs based on demographic and behavioral characteristics; and (iii) to identify the factors that can predict the use of SMAs. Background: There has been limited focus on investigating the behavior of laypeople in Jordan when it comes to seeking health information from SMAs. Methodology: A cross-sectional study was conducted among the general population in Jordan using an online questionnaire administered to 207 users. A purposive sampling technique was employed, wherein all the participants actively sought online health information. Descriptive statistics, t-tests, and regression analyses were utilized to analyze the collected data. Contribution: This study adds to the existing body of research on health information seeking from SMAs in developing countries, with a specific focus on Jordan. Moreover, laypeople, often disregarded by researchers and health information providers, are the most vulnerable individuals who warrant greater attention. Findings: The findings indicated that individuals often utilized YouTube as a platform to acquire health-related information, whereas their usage of Facebook for this purpose was less frequent. Participants rarely utilized Instagram and WhatsApp to obtain health information, while Twitter and Snapchat were very seldom used for this purpose. The variable of sex demonstrated a notable positive correlation with the utilization of YouTube and Twitter for the purpose of finding health-related information. Conversely, the variable of nationality exhibited a substantial positive correlation with the utilization of Facebook, Instagram, and Twitter. Consulting medical professionals regarding information obtained from the Internet was a strong indicator of using Instagram to search for health-related information. Recommendations for Practitioners: Based on the empirical results, this study provides feasible recommendations for the government, healthcare providers, and developers of SMAs. Recommendation for Researchers: Researchers should conduct separate investigations for each application specifically pertaining to the acquisition of health-related information. Additionally, it is advisable to investigate additional variables that may serve as predictors for the utilization of SMAs. Impact on Society: The objective of this study is to enhance the inclination of the general public in Jordan to utilize SMAs for health-related information while also maximizing the societal benefits of these applications. Future Research: Additional research is required to examine social media’s usability (regarding ease of use) and utility (comparing advantages to risks) in facilitating effective positive change and impact in healthcare. Full Article
inform Feature analytics of asthma severity levels for bioinformatics improvement using Gini importance By www.inderscience.com Published On :: 2024-11-08T23:20:50-05:00 In the context of asthma severity prediction, this study delves into the feature importance of various symptoms and demographic attributes. Leveraging a comprehensive dataset encompassing symptom occurrences across varying severity levels, this investigation employs visualisation techniques, such as stacked bar plots, to illustrate the distribution of symptomatology within different severity categories. Additionally, correlation coefficient analysis is applied to quantify the relationships between individual attributes and severity levels. Moreover, the study harnesses the power of random forest and the Gini importance methodology, essential tools in feature importance analytics, to discern the most influential predictors in asthma severity prediction. The experimental results bring to light compelling associations between certain symptoms, notably 'runny-nose' and 'nasal-congestion', and specific severity levels, elucidating their potential significance as pivotal predictive indicators. Conversely, demographic factors, encompassing age groups and gender, exhibit comparatively weaker correlations with symptomatology. These findings underscore the pivotal role of individual symptoms in characterising asthma severity, reinforcing the potential for feature importance analysis to enhance predictive models in the realm of asthma management and bioinformatics. Full Article
inform International Journal of Bioinformatics Research and Applications By www.inderscience.com Published On :: Full Article
inform International Journal of Information and Operations Management Education By www.inderscience.com Published On :: Full Article
inform Modeling the Organizational Aspects of Learning Objects in Semantic Web Approaches to Information Systems By Published On :: Full Article
inform Decoupling the Information Application from the Information Creation: Video as Learning Objects in Three-Tier Architecture By Published On :: Full Article
inform Learning Objects and E-Learning: an Informing Science Perspective By Published On :: Full Article
inform Designing Online Information Aggregation and Prediction Markets for MBA Courses By Published On :: Full Article
inform Comparing Perceived Formal and Informal Learning in Face-to-Face versus Online Environments By Published On :: Full Article
inform The Impact of Learning with Laptops in 1:1 Classes on the Development of Learning Skills and Information Literacy among Middle School Students By Published On :: Full Article
inform What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability? By Published On :: Full Article
inform ICT Use: Educational Technology and Library and Information Science Students' Perspectives – An Exploratory Studyew Article By Published On :: 2015-12-14 This study seeks to explore what factors influence students’ ICT use and web technology competence. The objectives of this study are the following: (a) To what extent do certain elements of Rogers’ (2003) Diffusion of Innovations Theory (DOI) explain students’ ICT use, (b) To what extent do personality characteristics derived from the Big Five approach explain students’ ICT use, and (c) To what extent does motivation explain students’ ICT use. The research was conducted in Israel during the second semester of the academic year 2013-14, and included two groups of participants: a group of Educational Technology students (ET) and a group of Library and Information Science students (LIS). Findings add another dimension to the importance of Rogers’ DOI theory in the fields of Educational Technology and Library and Information Science. Further, findings confirm that personality characteristics as well as motivation affect ICT use. If instructors would like to enhance students’ ICT use, they should be aware of individual differences between students, and they should present to students the advantages and usefulness of ICT, thus increasing their motivation to use ICT, in the hopes that they will become innovators or early adopters. Full Article