bl

Table of Contents: Issues in Informing Science and Informing Technology. Volume 19, 2022

Table of Contents for IISIT Volume 19, 2022




bl

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




bl

Case-Based Experiential/Immersive Learning for Business Problem-Solving: A Plan in Progress

Aim/Purpose. Business schools need to design, develop and deliver courses that are relevant to business problem-solving. Current pedagogies do not often provide the insight – or experience – necessary to close the gap between theory and practice. Background. The paper describes an initiative to design, develop and deliver courses in business-technology problem-solving that thoroughly immerses students in the actual world of business. Methodology. The methodology included case-based analysis where actual cases where selected to model problem-solving scenarios. Contribution. Several courses are developed that immerse students into actual problem-solving experiences. Findings The courses will be delivered to business students to assess the impact of immersive/experiential learning. Recommendations for Practitioners. Additional courses should be informed by actual cases; the commitment to relevance should be expanded. Recommendations for Researchers. Ongoing research to measure the impact of immersive/experiential learning is recommended. Impact on Society. Business schools should rethink the content of their courses and the pedagogies that have dominated business schools for many decades. Future Research. Additional research will include more courses and additional immersive/experiential pedagogies.




bl

Table of Contents: Issues in Informing Science and Informing Technology. Volume 20, 2023

Table of Contents for IISIT Volume 20, 2023




bl

Table of Contents: Issues in Informing Science and Informing Technology. Volume 21, 2024

Table of Contents for IISIT Volume 21, 2024




bl

Printable Table of Contents: IJIKM, Volume 1, 2006




bl

A Methodology for Increasing Business Process Maturity in Public Sector




bl

Printable Table of Contents: IJIKM, Volume 2, 2007




bl

Printable Table of Contents: IJIKM, Volume 3, 2008




bl

Printable Table of Contents: IJIKM, Volume 4, 2009




bl

Simulation Modeling of an Iron Ore Operation to Enable Informed Planning




bl

Printable Table of Contents: IJIKM, Volume 5, 2010




bl

Printable Table of Contents: IJIKM, Volume 6, 2011




bl

(GbL #3) Innovative Teaching Using Simulation and Virtual Environments




bl

(GbL #2) Constructive Simulation as a Collaborative Learning Tool in Education and Training of Crisis Staff




bl

(GbL #1) Life Skills Developed by Those Who Have Played in Video Game Tournaments




bl

Introduction to the Special Section on Game-based Learning: Design and Applications (GbL)




bl

Text-Based Collaborative Work and Innovation: Effects of Communication Media Affordances on Divergent and Convergent Thinking in Group-Based Problem-Solving




bl

Critical Success Factors for ERP Systems Implementation in Public Administration




bl

The Survey of Information Systems in Public Administration in Poland




bl

Change management in information systems projects for public organizations

It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work.




bl

Knowledge Management and Problem Solving in Real Time: The Role of Swarm Intelligence

Knowledge management research applied to the development of real-time research capability, or capability to solve societal problems in hours and days instead of years and decades, is perhaps increasingly important, given persistent global problems such as the Zika virus and rapidly developing antibiotic resistance. Drawing on swarm intelligence theory, this paper presents an approach to real-time research problem-solving in the form of a framework for understanding the complexity of real-time research and the challenges associated with maximizing collaboration. The objective of this research is to make explicit certain theoretical, methodological, and practical implications deriving from new literature on emerging technologies and new forms of problem solving and to offer a model of real-time problem solving based on a synthesis of the literature. Drawing from ant colony, bee colony, and particle swarm optimization, as well as other population-based metaheuristics, swarm intelligence principles are derived in support of improved effectiveness and efficiency for multidisciplinary human swarm problem-solving. This synthesis seeks to offer useful insights into the research process, by offering a perspective of what maximized collaboration, as a system, implies for real-time problem solving.




bl

External Variables as Antecedents of Users Perception in Virtual Library Usage

Several studies extended the Technology Acceptance Model (TAM) by examining the antecedents of perceived usefulness and perceived ease of use; the present study looks at demographic aspect of external variables in virtual library use among undergraduate students. The purpose of this study is to identify the demographic factors sex, level of study, cumulative grade point average, and computer knowledge that act as external factors that are antecedents of perceived usefulness and perceived ease of use. The university management makes a large investment in the provision of a virtual library; investigation of the virtual library acceptance by students is important. TAM and theory of reasoned action (TRA) are utilised to theoretically test a model for the extension and to predict virtual library acceptance and usage. In a survey study, data was collected by using a structured questionnaire given to 394 randomly selected participants in a private university. Data were analysed by Pearson product moment correlation, multiple and hierarchical regression. The result of the study is consistent with TAM factors examined for explaining virtual library usage. The extension model accounts for 2.5% variance in perceived usefulness, 2.1% in perceived ease of use, 11.7% - 15.2% on intention to use and 7.2% on actual use of virtual library. Implications of the findings of the study on user’s virtual library training are discussed.




bl

ICT-Platform to Transform Car Dealerships to Regional Providers of Sustainable Mobility Services

Aim/Purpose: The topic of this study is the ICT-enabled transformation of car dealerships to regional providers of sustainable mobility (e.g., car sharing). Background: Car dealerships offer specific conditions that enable a sustainable mobility offer, based on individual motorized transport like car sharing. This is especially useful in small towns or rural areas where people’s mobility is strongly dominated by private cars, and public transport coverage is limited. However, these new mobility services are combined services with the need of a deep integration of information systems, and these services are not yet related to car dealerships and customer acquisition has to be supported. Methodology: An empirical study with an inductive approach was chosen. The study consists of interviews with three focus groups of different stakeholders of car dealerships. Within the frame of the research project, “ReCaB – Regional Car-Balancing” a qualitative research approach was chosen. Within a design science approach the existing SusCRM architecture was adapted based on the elaborated requirements. Contribution: A software architecture is proposed, where Customer Relationship Management (CRM) components to market new sustainable mobility offers are vital parts and existing information systems of car dealerships are integrated. Findings: The basic feasibility of the establishment and customer acceptance has been demonstrated, at least in the area of car sharing within ReCaB. The execution in the car sharing field has already started and a number of car dealerships are already bringing their own offers to market. Major findings for the SusCRM architecture have been elaborated in a design science approach in the national German research project “Showcase for electro mobility”. Recommendations for Practitioners: There is still no fully functional prototype developed for this specific use case and evaluated in the car dealership environment. An implementation only, based on own efforts, is difficult for car dealerships because of the dealership’s lack of know-how as well as tight IT budgets. However, this approach appears particularly successful in rural areas where public transport services are heavily declining. For full implementation, the presented ICT support is imperative. Recommendation for Researchers: The research on the retailer level, especially in combination with a digital trans-formation by the use of ICT systems, is still fragmentary. Research in this area that both addresses sustainability goals on a general level and supports economical goals on the company level of automotive retailers would be useful. Impact on Society: Creation of sustainable offers as a substitute or supplement for mobility based on their own car is a promising way to reduce negative effects of mobility. Enhancement of the mobility of the people in rural areas is leading to a more active lifestyle by reaching the leisure facilities, workplaces and educational institutions in a sustainable manner. Future Research: In terms of the fast changing mobility landscape, especially on a technical level with the development of autonomous vehicles and digitalization of entire businesses new solutions are becoming accessible, that have to be integrated in further research.




bl

Socio-Technical Approach, Decision-Making Environment, and Sustainable Performance: Role of ERP Systems

Aim/Purpose: This explanatory study aimed to determine the mediating role of ERP in the relation between the effect of a socio-technical approach and decision-making environment, and firms’ sustainable performance. Background: Although earlier studies have discussed the critical success factors of the failure or success of an ERP system and the extent to which it achieves its desired objectives, the current study focused on the significant impact of socio-technical elements and decision-making environment on the success of the ERP system (i.e., sustainable performance). In addition, the lack of research on ERP as a mediator in the above relationship motivated this study to bridge the literature gap. Methodology: The data was collected using questionnaires distributed to 233 randomly selected employees of three multinational companies (BP, LUKOIL, and Eni) operating in Iraq. The structural equation modeling was employed to test the hypothesized relationships. Contribution: The study contributes to the literature by examining the mediating role of the ERP system in the relationship between socio-technical elements and the decision-making environment, as well as, the moderating role of organizational culture in the relationship between socio-technical elements and ERP systems. Findings: The results showed that ERP is a significant mediator between the linkage of socio-technical elements and the decision-making environment while organizational culture has an insignificant moderating role in the relationship between socio-technical elements and ERP systems. Recommendations for Practitioners: In a developing country like Iraq, there is a need to implement ERP to achieve better sustainable performance through change management and organizational development that ultimately work towards enhancing individual capabilities, knowledge, and training. Recommendation for Researchers: The researchers are recommended to conduct an in-depth study of the phenomenon based on theoretical and empirical grounds, particularly in light of the relationship of socio-technical elements and decision-making environments. Impact on Society: This study provides a reference for organizations with similar cultural backgrounds in using ERP systems to minimize pollution in Iraqi context. Future Research: A more in-depth study can be performed using a bigger sample, which not only includes the oil industry but also the other industries.




bl

The Role of Knowledge Management Process and Intellectual Capital as Intermediary Variables between Knowledge Management Infrastructure and Organization Performance

Aim/Purpose: The objective of this study was to assess the interrelationships among knowledge management infrastructure, knowledge management process, intellectual capital, and organization performance. Background: Although knowledge management capability is extensively used by organizations, reaching their maximum financial and non-financial performances has not been fully researched. Therefore, organizations need to optimize their performance by exploiting knowledge management capability through the accumulation of intellectual capital, where the new competitiveness is shifting from tangible to intangible resources. Methodology: This study adopted a positivist philosophy and deductive approach to accomplish the main goal of this research. Moreover, this research employed a quantitative approach since this study is concerned with causal relationship between variables. A questionnaire-based survey was designed to evaluate the research model using a convenience sample of 134 employees from the food industry sector in Jordan. Surveyed data was examined following the structural equation modeling procedures. Contribution: This study highlighted the potential benefits of applying the knowledge management capabilities, intellectual capital, and organizational performance to the food industrial sector in Jordan. Future research suggestions are also provided. Findings: Results indicated that knowledge management infrastructure had a positive effect on knowledge management process. In addition, knowledge management process impacted positively intellectual capital and organization performance and mediated the relationship between knowledge management infrastructure and intellectual capital. However, knowledge management infrastructure did not positively associate to organization performance. Recommendations for Practitioners: The current model is designed to help managers and decision makers to improve their management capabilities as well as their organization financial and non-financial performance through exploiting the organizational knowledge management infrastructure and intellectual capital approaches. Recommendation for Researchers: Our findings can be used as a base of knowledge to conduct further studies about knowledge management capabilities, intellectual capital, and organization performance following different criteria and research procedures. Impact on Society: The designed model highlights a significant organizational performance approach that can influence Jordanian food industrial sector positively. Future Research: The current designed research model can be applied and assessed further in other sectors including banking and industrial sectors across developed and developing countries. Also, we suggest that in addition to focusing on knowledge management process and intellectual capital as mediating variables, future research could test our findings in a longitudinal study and examine how to affect financial and non-financial performance.




bl

Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector

Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature.




bl

IJIKM Volume 13, 2018 – Table of Contents




bl

Knowledge Sharing Process and Innovation Success: Evidence from Public Organisations in Southern Nigeria

Aim/Purpose: This study investigates the relationship between knowledge sharing process and innovation success with specific emphasis on tacit knowledge. Based on the literature review, we hypothesised that knowledge donating and collecting have a positive relationship with innovation success. Methodology: The hypotheses were empirically tested using the partial least square path modelling with data collected from twelve state-owned public organisations operating in Southern Nigeria. Contribution: The research made distinct empirical contributions to the burgeoning literature on knowledge sharing and innovation from the public sector and developing country context. Findings: Knowledge donating and collecting contribute to innovation success positively and significantly. Knowledge donating effect on innovation success was found to be more significantly positive than the effect of knowledge collecting on innovation success. Recommendations for Practitioners: Public organisations should promote a supportive culture to spur innovation through the frequent share of experiences, information and skills among the various knowledge actors. Public managers should convey the importance of knowledge sharing and its value to knowledge users in clear terms and attend to creating conditions or contexts that encourage people to share knowledge freely and willingly with others. It is apt to improve organisational commitment and support for knowledge sharing activities such as mentorship programs, workshops, conferences, seminars and other related training and development programs in order to provide opportunities for employees to develop innovation competencies from the transfer of tacit knowledge developed over time from experience. To optimise innovation outcomes from knowledge sharing practices, knowledge sharing should be in tandem with the industry or global best practices. Future Research: Future studies should add interviews to provide depth in terms of insights and substance to the questionnaire, and may extend to public organisation with different ownership structure.




bl

IJIKM Volume 14, 2019 – Table of Contents




bl

Social Media Use and Its Effect on Knowledge Sharing: Evidence from Public Organisations in Delta State, Nigeria

Aim/Purpose: This study investigates social media use and its effect on knowledge sharing. Based on the review of related literature, we hypothesised that social media use has a significant effect on outward and inward knowledge sharing. Background: While the notion of social media use in work organisations has been progressively developed, empirical studies linking social media to the context of knowledge sharing have only begun to emerge. Even so, literature on social media use and its impact on public organisation is still tentative and remains a developing area. Methodology: The partial least square method was utilised in testing of hypotheses with data collected from 103 employees, who by virtue of their position and job function(s) interface with the public for the purpose of sharing knowledge via the social media space. Contribution: The study made contributions to the social knowledge management literature in two ways. First, the study developed a research model that links social media use to the two distinct dimensions of knowledge sharing. Second, the study provides a quantitative approach, where statistical techniques were applied to validate the social media use and knowledge sharing link. Findings: Statistically, the public organisations utilise social media partly for knowledge sharing, with its effect being significant on outward knowledge sharing and insignificant on inward knowledge sharing. This indicates that social media were deployed mainly for information dissemination “outward knowledge sharing” and not for stakeholders’ feedback and interaction “inward knowledge sharing”. Recommendations for Practitioners: Public organisations should develop a policy framework and guidelines for social media use to encourage the full use of this technology to inform and interact with stakeholders. It is important for this policy document to adopt best practices regarding interactive spaces so that both knowledge sharing dimensions manifest themselves in social media communications. Second, it is necessary to carry out staff training for the professional use of this technology for knowledge sharing. Recommendation for Researchers: Future studies should extend to more populations in different contexts to validate findings Impact on Society: This paper intends to influence practices adopted by organisations in the public sector to improve the knowledge sharing dimensions via the social media space. Future Research: Future studies may extend to public organisations in other geographical locations around Nigeria. It will be useful for studies to provide an international perspective by sampling public organisations from different countries or by comparing and contrasting the findings of other studies, specifically those from other countries. A longitudinal study should be encouraged to detect advancement or development with regards to the subject matter over a period of time.




bl

IJIKM Volume 15, 2020 – Table of Contents

Table of Contents for Volume 15, 2020, of the Interdisciplinary Journal of Information, Knowledge, and Management




bl

Transition to a Competitive Consultant Selection Method: A Case Study of a Public Agency in Israel

Aim/Purpose: This paper reports a case study of organizational transition from a non-competitive selection method to a novel bidding method for the selection of consultants in the Architectural and Engineering (A/E) industry. Background: Public procurement agencies are increasingly relying on external consultants for the design of construction projects. Consultant selection can be based on either competitive bidding, or quality-based criteria, or some combination between these two approaches. Methodology: Different sources of information were reviewed: internal documents, and quantitative data from the enterprise software platform (ERP). In addition, informal and unstructured interviews were conducted with relevant officials. Contribution: As there are mixed opinions in the scientific literature regarding the use of competitive bidding for the selection of consultants in the A/E industry, this paper contributes a detailed review of a transition to a competitive selection method and provides a financial and qualitative comparison between the two methods. In addition, the method implemented is novel, as it delegates most of the responsibility of hiring and managing consultants to one main contractor. Findings: While the new selection method was intended to reduce bureaucratic overload, it has unexpectedly also succeeded to reduce costs as well. Recommendations for Practitioners: It may be more efficient and profitable to adopt the selection method described in this study. Recommendation for Researchers: Similar methods can be applied to other industries successfully. Impact on Society: Our method was applied in a public organization and resulted in a better outcome, both financial and managerial. Adopting this approach can benefit public budgets. Future Research: The selection, data storage, and analysis methods are interrelated components. Future analysis of these components can help better shape the consultant selection process.




bl

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.




bl

Establishing a Security Control Framework for Blockchain Technology

Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures.




bl

Understanding the Determinants of Wearable Payment Adoption: An Empirical Study

Aim/Purpose: The aim of this study is to determine the variables which affect the intention to use Near Field Communication (NFC)-enabled smart wearables (e.g., smartwatches, rings, wristbands) payments. Background: Despite the enormous potential of wearable payments, studies investigating the adoption of this technology are scarce. Methodology: This study extends the Technology Acceptance Model (TAM) with four additional variables (Perceived Security, Trust, Perceived Cost, and Attractiveness of Alternatives) to investigate behavioral intentions to adopt wearable payments. The moderating role of gender was also examined. Data collected from 311 Kuwaiti respondents were analyzed using Structural Equation Modeling (SEM) and multi-group analysis (MGA). Contribution: The research model provided in this study may be useful for academics and scholars conducting further research into m-payments adoption, specifically in the case of wearable payments where studies are scarce and still in the nascent stage; hence, addressing the gap in existing literature. Further, this study is the first to have specifically investigated wearable payments in the State of Kuwait; therefore, enriching Kuwaiti context literature. Findings: This study empirically demonstrated that behavioral intention to adopt wearable payments is mainly predicted by attractiveness of alternatives, perceived usefulness, perceived ease of use, perceived security and trust, while the role of perceived cost was found to be insignificant. Recommendations for Practitioners: This study draws attention to the importance of cognitive factors, such as perceived usefulness and ease of use, in inducing users’ behavioral intention to adopt wearable payments. As such, in the case of perceived usefulness, smart wearable devices manufacturers and banks enhance the functionalities and features of these devices, expand on the financial services provided through them, and maintain the availability, performance, effectiveness, and efficiency of these tools. In relation to ease of use, smart wearable devices should be designed with an easy to use, high quality and customizable user interface. The findings of this study demonstrated the influence of trust and perceived security in motivating users to adopt wearable payments, Hence, banks are advised to focus on a relationship based on trust, especially during the early stages of acceptance and adoption of wearable payments. Recommendation for Researchers: The current study validated the role of attractiveness of alternatives, which was never examined in the context of wearable payments. This, in turn, provides a new dimension about a determinant factor considered by customers in predicting their behavioral intention to adopt wearable payments. Impact on Society: This study could be used in other countries to compare and verify the results. Additionally, the research model of this study could also be used to investigate other m-payments methods, such as m-wallets and P2P payments. Future Research: Future studies should investigate the proposed model in a cross-country and cross-cultural perspective with additional economic, environmental, and technological factors. Also, future research may conduct a longitudinal study to explain how temporal changes and usage experience affect users’ behavioral intentions to adopt wearable payments. Finally, while this study included both influencing factors and inhibiting factors, other factors such as social influence, perceived compatibility, personal innovativeness, mobility, and customization could be considered in future research.




bl

Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa

Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving.




bl

IJIKM Volume 16, 2021 – Table of Contents

Table of Contents for Volume 16, 2021, of the Interdisciplinary Journal of Information, Knowledge, and Management




bl

Predicting Key Predictors of Project Desertion in Blockchain: Experts’ Verification Using One-Sample T-Test

Aim/Purpose: The aim of this study was to identify the critical predictors affecting project desertion in Blockchain projects. Background: Blockchain is one of the innovations that disrupt a broad range of industries and has attracted the interest of software developers. However, despite being an open-source software (OSS) project, the maintenance of the project ultimately relies on small core developers, and it is still uncertain whether the technology will continue to attract a sufficient number of developers. Methodology: The study utilized a systematic literature review (SLR) and an expert review method. The SLR identified 21 primary studies related to project desertion published in Scopus databases from the year 2010 to 2020. Then, Blockchain experts were asked to rank the importance of the identified predictors of project desertion in Blockchain. Contribution: A theoretical framework was constructed based on Social Cognitive Theory (SCT) constructs; personal, behavior, and environmental predictors and related theories. Findings: The findings indicate that the 12 predictors affecting Blockchain project desertion identified through SLR were important and significant. Recommendations for Practitioners: The framework proposed in this paper can be used by the Blockchain development community as a basis to identify developers who might have the tendency to abandon a Blockchain project. Recommendation for Researchers: The results show that some predictors, such as code testing tasks, contributed code decoupling, system integration and expert heterogeneity that are not covered in the existing developer turnover models can be integrated into future research efforts. Impact on Society: This study highlights how an individual’s design choices could determine the success or failure of IS projects. It could direct Blockchain crypto-currency investors and cyber-security managers to pay attention to the developer’s behavior while ensuring secure investments, especially for crypto-currencies projects. Future Research: Future research may employ additional methods, such as a meta-analysis, to provide a comprehensive picture of the main predictors that can predict project desertion in Blockchain.




bl

Adoption of Mobile Commerce and Mobile Payments in Ghana: An Examination of Factors Influencing Public Servants

Aim/Purpose: Mobile commerce adoption is low in developing countries; hence, public servants may not consider mobile commerce and mobile payments. Understanding the factors that influence mobile commerce and mobile payments in their context will aid in promoting those services. Background: The study investigates the factors that influence public servants’ mobile commerce and mobile payments in Ghana. Hence, it provides some understanding of the various aspects of mobile commerce and mobile payments adoption, such as acceptance, use, and eventual adoption into the user’s daily life, and how that affects their behaviour. Methodology: The research was conducted by surveying the factors influencing public servants’ adoption of mobile commerce and payments in Ghana. A cross-sectional survey was undertaken to put the research model to the test to measure the constructs and their relationships. Contribution: The study confirmed previous findings and created a new conceptual model for mobile commerce and mobile payment adoption and usage in the Ghanaian context. Findings: The variables of performance expectancy, trust, and facilitating conditions have a significant positive influence on behavioural intention. The factors of effort expectation and social influence have a significant negative impact. Price value and perceived reliability are latent variables that do not affect behavioural intention. Behavioural intention and facilitating conditions significantly influence the actual use behaviour of mobile commerce and mobile payment users. Recommendations for Practitioners: Mobile commerce is emerging as a new mode of transactions, with firms providing enabling platforms for users. Mobile commerce could become the most acceptable application for the next generation of mobile platform applications. This study offers insights into the fluidity of the mobile environment, with implications that spell out what will be effective mobile commerce services that will continue to be relevant. Mobile applications are attractive to people because they provide a better user experience. These mobile applications have been optimised to provide a fast, easy and delightful experience. Mobile commerce and mobile payment service providers can attract and retain more users if attention is paid to performance expectancy, trust, and facilitating conditions since they influence individuals’ decisions to adopt. Mobile technology is almost ubiquitous, influencing both online sales and in-store sales. With the right mobile commerce platform and features, businesses can expect to increase in-store and online sales, catering to a more extensive clientele. Mobile devices are the primary means that most customers use to look up information about products they see in stores, such as product reviews and pricing options. This study indicates that mobile commerce service providers can achieve a more extensive customer base by promoting performance expectancy, trust, and behavioural intentions. Recommendation for Researchers: Despite the numerous studies in the mobile commerce literature, few have used integrated models of perceived reliability, trust, and price value or methods to evaluate these factors in the emerging mobile commerce industry. Also, it combines mobile commerce and mobile payments, which very few that we know of have done. Impact on Society: Ghana is already in a cash-lite economy. Thus, the study is appropriate with the result of trust being a significant factor. It implies that people will begin using mobile commerce and mobile payments with a bit of drive to bring about this drive quickly. Future Research: Future research could further test the adapted model with moderating factors of age, gender, and education to delve deeper into the complexities of mobile commerce and mobile payments.




bl

IJIKM Volume 17, 2022 – Table of Contents

Table of Contents for Volume 17, 2022, of the Interdisciplinary Journal of Information, Knowledge, and Management




bl

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




bl

Unveiling Roadblocks and Mapping Solutions for Blockchain Adoption by Governments: A Systematic Literature Review

Aim/Purpose: Blockchain technology (BCT) has emerged as a potential catalyst for transforming government institutions and services, yet the adoption of blockchain in governments faces various challenges, for which previous studies have yet to provide practical solutions. Background: This study aims to identify and analyse barriers, potential solutions, and their relations in implementing BC for governments through a systematic literature review (SLR). The authors grouped the challenges based on the Technology-Organisation-Environment (TOE) framework while exercising a thematic grouping for the solutions, followed by a comprehensive mapping to unveil the relationship between challenges and solutions. Methodology: This study employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 methodology, combined with the tollgate method, to improve the quality of selected articles. The authors further administer a three-level approach (open coding, axial coding, and selective coding) to analyse the challenges and solutions from the articles. Contribution: The authors argue that this study enriches the existing literature on BC adoption, particularly in the government context, by providing a comprehensive framework to analyse and address the unique challenges and solutions, thus contributing to the development of new theories and models for future research in BC adoption in government settings and fostering deeper exploration in the field. Findings: The authors have unveiled 40 adoption challenges categorised using the TOE framework. The most prevalent technological challenges include security concerns and integration & interoperability, while cultural resistance, lack of support and involvement, and employees’ capability hinder adoption at the organisational level. Notably, the environmental dimension lacks legal and standard frameworks. The study further unveils 28 potential solutions, encompassing legal frameworks, security and privacy measures, collaboration and governance, technological readiness and infrastructure, and strategic planning and adoption. The authors of the study have further mapped the solutions to the identified challenges, revealing that the establishment of legal frameworks stands out as the most comprehensive solution. Recommendations for Practitioners: Our findings provide a big picture regarding BC adoption for governments around the globe. This study charts the problems commonly encountered by government agencies and presents proven solutions in their wake. The authors endeavour practitioners, particularly those in governments, to embrace our findings as the cornerstone of BC/BCT adoption. These insights can aid practitioners in identifying existing or potential obstacles in adopting BC, pinpointing success factors, and formulating strategies tailored to their organisations. Recommendation for Researchers: Researchers could extend this study by making an in-depth analysis of challenges or solutions in specific types of countries, such as developed and developing countries, as the authors believe this approach would yield more insights. Researchers could also test, validate, and verify the mapping in this study to improve the quality of the study further and thus can be a great aid for governments to adopt BC/BCT fully. Impact on Society: This study provides a comprehensive exploration of BC adoption in the government context, offering detailed explanations and valuable insights that hold significant value for government policymakers and decision-makers, serving as a bedrock for successful implementation by addressing roadblocks and emphasising the importance of establishing a supportive culture and structure, engaging stakeholders, and addressing security and privacy concerns, ultimately enhancing the efficiency and effectiveness of BC adoption in government institutions and services. Future Research: Future research should address the limitations identified in this study by expanding the scope of the literature search to include previously inaccessible sources and exploring alternative frameworks to capture dynamic changes and contextual factors in BC adoption. Additionally, rigorous scrutiny, review, and testing are essential to establish the practical and theoretical validity of the identified solutions, while in-depth analyses of country-specific and regional challenges will provide valuable insights into the unique considerations faced by different governments.




bl

The Role of Corporate Social Responsibility in Business Performance: The Moderation Influence of Blockchain Technology

Aim/Purpose: The major challenges for firms to initiate corporate social responsibility (CSR) arise from resource constraints, complexity, and uncertainty. Consuming considerable financial and human resources is the main difficulty for smaller firms or those operating in less profitable industries, and the lack of immediate outputs from CSR initiatives poses a challenge for firms in prioritizing and assessing their effectiveness. Background: To better integrate CSR management into overall business strategy and decision-making processes, Blockchain technology (BCT) could potentially offer a feasible and optimal alternative to CSR reports. Methodology: This study uses the fixed effects regression by way of the Least Squares Dummy Variable (LSDV) approach in STATA to analyze the direct effect of CSR management on business performance and the moderating effect of BCT adoption on this relationship with a panel data set of 5810 observations collected from the 874 listed companies in 2015 in Taiwan Stock Exchange through 2021. Contribution: This study contributes to the literature by shedding light on the organizational factors that influence BCT adoption. Findings: The findings show that firms with high levels of CSR management have better business performance. Additionally, the adoption of BCT strengthens the positive relationship between CSR management and business performance, but it cannot replace the fundamental principles of CSR. Finally, firm size does not significantly affect BCT adoption, indicating that companies of all sizes have an equal opportunity to adopt BCT, which can help to level the playing field in terms of resources available to different firms. Recommendations for Practitioners: This study suggests that firms managing CSR practices have better business performance, and the adoption of BCTs further enhances this positive relationship. However, BCT adoption does not have the same positive effect on business performance as CSR practices. Additionally, this research can help to inform public policy related to BCT adoption and diffusion. Recommendation for Researchers: By exploring the factors that influence BCT adoption, future researchers can provide insights into the key challenges and opportunities faced by organizations of different sizes and help to develop strategies for promoting the effective adoption of BCT. Impact on Society: Given the limitations of current CSR reporting, the understanding gained from BCT applications can provide companies with an alternative mechanism to foster progress in CSR implementation. Future Research: Firstly, while the fixed-effects model might have dampened the power of explanation because it only captures within-unit variation and ignores between-unit variation, the explanatory power is further limited due to only integrating two independent variables in this model. Because of limited data availability, this study only utilizes CSR_Report and firm_size as independent variables. Future studies can consider more key factors and may lead to different results. Additionally, panel data is collected from Taiwan and, therefore, may not be representative of the broader population. Future researchers integrating the Stock Exchange of different countries are recommended.




bl

IJIKM Volume 18, 2023 – Table of Contents

Table of Contents for Volume 18, 2023, of the Interdisciplinary Journal of Information, Knowledge, and Management




bl

Fostering Trust Through Bytes: Unravelling the Impact of E-Government on Public Trust in Indonesian Local Government

Aim/Purpose: This study aims to investigate the influence of e-government public services on public trust at the local government level, addressing the pressing need to understand the factors shaping citizen perceptions and trust in government institutions. Background: With the proliferation of e-government initiatives worldwide, governments are increasingly turning to digital solutions to enhance public service delivery and promote transparency. However, despite the potential benefits, there remains a gap in understanding how these initiatives impact public trust in government institutions, particularly at the local level. This study seeks to address this gap by examining the relationship between e-government service quality, individual perceptions, and public trust, providing valuable insights into the complexities of citizen-government interactions in the digital age. Methodology: Employing a quantitative approach, this study utilises surveys distributed to users of e-government services in one of the regencies in Indonesia. The sample consists of 278 individuals. Data analysis is conducted using Partial Least Squares Structural Equation Modelling, allowing for the exploration of relationships among variables and their influence on public trust. Contribution: This study provides insights into the factors influencing public trust in e-government services at the local government level, offering a nuanced understanding of the relationship between service quality, individual perceptions, and public trust. Findings: This study emphasises information quality and service quality in e-government-based public services as crucial determinants of individual perception in rural areas. Interestingly, system quality in e-government services has no influence on individual perception. In the individual perception, perceived security and privacy emerge as the strongest antecedent of public trust, highlighting the need to guarantee secure and private services for citizens in rural areas. These findings emphasise the importance of prioritising high-quality information, excellent service delivery, and robust security measures to foster and sustain public trust in e-government services. Recommendations for Practitioners: Practitioners must prioritise enhancing the quality of e-government services due to their significant impact on individual perception, leading to higher public trust. Government agencies must ensure reliability, responsiveness, and the effective fulfilment of user needs. Additionally, upholding high standards of information quality in e-government services by delivering accurate, relevant, and timely information remains crucial. Strengthening security measures through robust protocols such as data encryption and secure authentication becomes essential for protecting user data. With that in mind, the authors believe that public trust in government would escalate. Recommendation for Researchers: Researchers could investigate the relation between system quality in e-government services and individual perception in different rural settings. Longitudinal studies could also elucidate how evolving service quality, information quality, and security measures impact user satisfaction and trust over time. Comparative studies across regions or countries can reveal cultural and contextual differences in individual perceptions, identifying both universal principles and region-specific strategies for e-government platforms. Analysing user behaviour and preferences across various demographic groups can inform targeted interventions. Furthermore, examining the potential of emerging technologies such as blockchain or artificial intelligence in enhancing e-government service delivery, security, and user engagement remains an interesting topic. Impact on Society: This study’s findings have significant implications for fostering public trust in government institutions, ultimately strengthening democracy and citizen-government relations. By understanding how e-government initiatives influence public trust, policymakers can make informed decisions to improve service delivery, enhance citizen engagement, and promote transparency, thus contributing to more resilient and accountable governance structures. Future Research: Future research could opt for longitudinal studies to evaluate the long-term effects of enhancements in service quality, information quality, and security. Cross-cultural investigations can uncover universal principles and contextual differences in user experiences, supporting global e-government strategies in rural areas. Future research could also improve the research model by adding more variables, such as risk aversion or fear of job loss, to gauge individual perceptions.




bl

Workers’ Knowledge Sharing and Its Relationship with Their Colleague’s Political Publicity in Social Media

Aim/Purpose: This paper intends to answer the question regarding the extent to which political postings with value differences/similarities will influence the level of implicit knowledge sharing (KS) among work colleagues in organizations. More specifically, the study assesses contributors’ responses to a workmate’s publicity about politics on social media platforms (SMP) and their eagerness to implement implicit KS to the co-worker. Background: Previously published articles have confirmed an association between publicity about politics and the reactions from workfellows in the organization. Moreover, prior work confirmed that workers’ social media postings about politics may create unfavorable responses, such as being disliked and distrusted by workfellows. This may obstruct the KS because interpersonal relations are among the KS’s essential components. Therefore, it is imperative to assess whether the workfellows’ relationship affected by political publicity would impede the KS in the office. Methodology: Data was gathered using the vignette technique and online survey. A total of 510 online and offline questionnaires were distributed to respondents in Indonesian Halal firms who have implemented knowledge-sharing practices and have been at work for no less than twelve months in the present role. Next, the 317 completed questionnaires were examined with partial least squares structural equation modeling (PLS-SEM). Contribution: Postings about politics on SMP can either facilitate or impede the level of KS in organizations, and this research topic is relatively scarce in the knowledge management discipline. While previously published articles have concentrated on public organizations, this research centers on private firms. Moreover, this work empirically examines private companies in Indonesia, which is also understudied in the existing literature. Findings: The outcomes confirm that perceived political value similarity (PPV) in a co-worker’s social-media publicity has a significant and indirect influence on contributors’ eagerness to perform implicit/tacit KS. Further, colleague likability and trustworthiness significantly influence the level of KS among respondents. As PPV significantly forms colleague likability, likability strongly and positively shapes trustworthiness. Recommendations for Practitioners: The study shows that political publicity significantly affects implicit knowledge sharing (KS). As a result, managers and leaders, particularly those in private firms, are strengthened to instruct their staff about the ramifications of publicity embedded in employees’ SMP postings, particularly about political topics, as it may result in either negative or positive perceptions amongst the staff towards the workmate who posts. Recommendation for Researchers: As this study focuses on examining KS behavior in a large context, i.e., Indonesia Halal firms that dominate the Indonesian economy, and the fact that much polarization research focuses on society at large and less on specific sectors of life, it is important and interesting for researchers to conduct similar studies in a specific workplace as political agreements and disagreements become so important and consequential in everyday lives. Impact on Society: This article makes the implication that a person’s personality can influence how they react to political posts on SMP. It is difficult for the exposers to know the personality of each viewer of publicity in daily life. Workers’ newfound knowledge can motivate them to use SMP responsibly and lessen the probability that they will disclose information that might make their co-workers feel or perceive anything unfavorably. Future Research: There is a need for further studies to examine if the results can be applied to different locations and organizations, as individuals’ behaviors may vary according to the cultures of society and firms. Furthermore, future research can take into account the individual characteristics of workers, such as hospitability, self-confidence, and psychological strength, which may be well-matched with future work models. Future research may potentially employ a qualitative technique to offer deeper insights into the same topic.




bl

Factors Influencing Adoption of Blockchain Technology in Jordan: The Perspective of Health Care Professionals

Aim/Purpose: This paper investigates the user acceptability of blockchain technology in the healthcare sector, with a specific focus on healthcare professionals in Jordan. Background: The study seeks to identify the factors that affect healthcare professionals’ use and acceptance of blockchain technology in Jordan. Methodology: The study’s research framework integrates factors from the Technology Acceptance Model (TAM) and the Unified Theory of Acceptance and Use of Technology (UTAUT). A questionnaire was distributed to collect data from 372 healthcare professionals in Jordan, and the results were analyzed using structural equation modeling based on the Partial Least Square (PLS) technique. Contribution: While only a few previous studies have explored blockchain technology acceptance in the healthcare sector using either the TAM or the UTAUT, this study uniquely integrates elements from both models, offering a novel approach that provides a comprehensive understanding of the factors that influence the acceptance of blockchain technology among healthcare professionals in Jordan. The findings can assist decision-makers in developing strategies to enhance the adoption rate of blockchain technology in the Jordanian healthcare sector. Findings: The study revealed that usability, convenience, privacy and security, cost, and trust significantly impact the perceived usefulness of blockchain technology. The findings also suggest that healthcare professionals are more likely to have a positive attitude towards blockchain-based healthcare systems if they perceive them as useful and easy to use. Attitude, social influence, and facilitating conditions were found to significantly impact behavioral intention to use. Recommendations for Practitioners: Stakeholders should focus on developing blockchain-based healthcare systems that are easy to use, convenient, efficient, and effort-free. Recommendation for Researchers: Researchers may compare the acceptance of blockchain technology in the healthcare sector with other industries to identify industry-specific factors that may influence adoption. This comparative analysis can contribute to a broader understanding of technology acceptance. Impact on Society: Successful adoption of blockchain technology in the healthcare sector can lead to improved efficiency, enhanced protection of healthcare data, and reduced administrative burdens. This, in turn, can positively impact patient care and lead to cost savings, which contributes to more sustainable and accessible healthcare services. Future Research: Future research may explore integrating blockchain technology with other emerging technologies, such as artificial intelligence and sidechain, to create more comprehensive and innovative healthcare solutions.




bl

Barriers of Agile Requirements Engineering in the Public Sector: A Systematic Literature Review

Aim/Purpose: The objective of this study is to summarize the challenges of Agile Requirements Engineering (Agile RE) in the public sector in republican and constitutional monarchy nations. Additionally, it offers recommendations to address these challenges. Background: Failure of IT projects in the public sector results in financial losses for the state and loss of public trust, often attributed to issues in requirements engineering such as prioritization of user needs and excessive scope of requirements. IT projects can have a higher success rate with Agile RE, but there are also drawbacks. Therefore, this study holds significance by presenting a thorough framework designed to pinpoint and overcome the challenges associated with Agile RE to increase the success rate of IT projects. Methodology: This study employs a Systematic Literature Review (SLR) protocol in the field of software engineering or related domains, which consists of three main phases: planning the review, conducting the review with a snowballing approach, and reporting the review. Furthermore, the authors perform open coding to categorize challenges based on the Agile methodologies adoption factor model and axial coding to map potential solutions. Contribution: The authors assert that this research enriches the existing literature on Agile RE, specifically within the public sector context, by mapping out challenges and possible solutions that contribute to creating a foundation for future studies to conduct a more in-depth analysis of Agile adoption in the public sector. Furthermore, it compares the barriers of Agile RE in the public sector with the general context, leading to the discovery of new theories specifically for this field. Findings: Most challenges related to Agile RE in the public sector are found in the people and process aspects. Project and organizational-related are subsequent aspects. Therefore, handling people and processes proficiently is imperative within Agile RE to prevent project failure. Recommendations for Practitioners: Our findings offer a comprehensive view of Agile RE in the public sector in republican and constitutional monarchy nations. This study maps the challenges encountered by the public sector and provides potential solutions. The authors encourage practitioners to consider our findings as a foundation for adopting Agile methodology in the public sector. Furthermore, this study can assist practitioners in identifying existing barriers related to Agile RE, pinpointing elements that contribute to overcoming those challenges, and developing strategies based on the specific needs of the organizations. Recommendation for Researchers: Researchers have the potential to expand the scope of this study by conducting research in other countries, especially African countries, as this study has not yet encompassed this geographic region. Additionally, they can strengthen the evidence linking Agile RE challenges to the risk of Agile project failure by performing empirical validation in a specific country. Impact on Society: This research conducts a comprehensive exploration of Agile RE within the public sector, serving as a foundation for the successful adoption of Agile methodology by overcoming obstacles related to Agile RE. This study highlights the importance of managing people, processes, projects, and organizational elements to increase the success of Agile adoption in the public sector. Future Research: In the future, researchers should work towards resolving the limitations identified in this study. This study has not provided a clear prioritization of challenges and solutions according to their significance. Therefore, future researchers can perform a Fuzzy Analytical Hierarchical Process (F-AHP) to prioritize the proposed solutions.




bl

Continued Usage Intention of Mobile Learning (M-Learning) in Iraqi Universities Under an Unstable Environment: Integrating the ECM and UTAUT2 Models

Aim/Purpose: This study examines the adoption and continued use of m-learning in Iraqi universities amidst an unstable environment by extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) and Expectation-Confirmation Model (ECM) models. The primary goal is to address the specific challenges and opportunities in Iraq’s higher education institutions (HEIs) due to geopolitical instability and understand their impact on student acceptance, satisfaction, and continued m-learning usage. Background: The research builds on the growing importance of m-learning, especially in HEIs, and recognizes the unique challenges faced by institutions in Iraq, given the region’s instability. It identifies gaps in existing models and proposes extensions, introducing the variable “civil conflicts” to account for the volatile context. The study aims to contribute to a deeper understanding of m-learning acceptance in conflict-affected regions and provide insights for improving m-learning initiatives in Iraqi HEIs. Methodology: To achieve its objectives, this research employed a quantitative survey to collect data from 399 students in five Iraqi universities. PLS-SEM is used for the analysis of quantitative data, testing the extended UTAUT2 and ECM models. Contribution: The study’s findings are expected to contribute to the development of a nuanced understanding of m-learning adoption and continued usage in conflict-affected regions, particularly in the Iraqi HEI context. Findings: The study’s findings may inform strategies to enhance the effectiveness of m-learning initiatives in Iraqi HEIs and offer insights into how education can be supported in regions characterized by instability. Recommendations for Practitioners: Educators and policymakers can benefit from the research by making informed decisions to support education continuity and quality, particularly in conflict-affected areas. Recommendation for Researchers: Researchers can build upon this study by further exploring the adoption and usage of m-learning in unstable environments and evaluating the effectiveness of the proposed model extensions. Impact on Society: The research has the potential to positively impact society by improving access to quality education in regions affected by conflict and instability. Future Research: Future research can expand upon this study by examining the extended model’s applicability in different conflict-affected regions and assessing the long-term impact of m-learning initiatives on students’ educational outcomes.