info

Table of Contents: Issues in Informing Science and Informing Technology. Volume 19, 2022

Table of Contents for IISIT Volume 19, 2022




info

Impact of Gender on Perceived Work Climate in Business Information Systems

Aim/Purpose: The low proportion of women currently working in the field of business information systems presents an opportunity to attract more women to this field. For example, in Germany, the proportion of women studying business information systems is currently 21%, compared to 48% in business administration (Statistisches Bundesamt, 2020). Which characteristics make the professional field of business information systems appear attractive to women and men – and which characteristics do not? Background: Studies on careers in business information systems are important to mitigate the long-lasting shortage of IT specialists, yet research is limited in this area. Methodology: To capture empirical data, graduates of the Business Information Systems program at the University of Applied Sciences in Hannover were surveyed. Contribution: The results show that women and men perceive the work climate and working conditions very differently and are also satisfied to a different extent. Characteristics of the work climate place significantly more restrictions on satisfaction for women than for men. Women primarily criticize characteristics that can be described as involving “a lack of fairness”. Findings: The differences in perceived work climate may negatively impact the proportion of women in business information systems. A number of measures have already been established to support women in coping better with the prevailing climate. However, some measures bear the risk that women are thus accused of assimilating to the prevailing climate. This can seem pre-sumptuous since the dominant male culture is taken for granted and “set”. Measures for team-building and personnel development appear to be more suitable if these address the actual values and norms of teamwork, question them where necessary, and change them for everyone. Recommendations for Practitioners: Women’s career goals are clearly different from men’s goals, and women do not achieve goals with high priority very well. Work climate is perceived more critically by women than by men: less fair, less supportive. Advantages of diversity and plurality are put at risk if women should put aside their different “other” perceptions of cooperation and negotiation in order to act according to the rules of the male-dominated system. Impact on Society: Studies on careers in business information systems are important to mitigate the longer-lasting shortage of IT specialists. The low proportion of women currently working in IT presents an opportunity to attract more women to business information systems.




info

Table of Contents: Issues in Informing Science and Informing Technology. Volume 19, 2022

Table of Contents for IISIT Volume 19, 2022




info

The Role of the Discipline of Information Technology: A Systematic Literature Review

Aim/Purpose. The goal of this publication is to explore methods for advancing student success in technology related disciplines via improved program classification and selection within higher education. Background. Increased demand for information technology (IT) professionals has been cited as a challenge in many fields including cybersecurity and software development. Many highlight the challenge as not just a numbers gap but a skills gap when comparing industry needs to the curricula in traditional disciplines within higher education. Closing the gap by increasing the number of skilled graduates remains a critical challenge we must address. Methodology. This publication leverages a systematic literature review to identify factors that classify existing higher education programs within the discipline of information technology. Contribution. Research in this area can act as a catalyst to increase relevance of IT related programs as well as graduation rates in technology and engineering. Findings. Authors analyzed forty-four primary studies and found that 56.8% of the publications referenced programs that meet the IT framework definition although they were not classified as IT programs. The findings and further analysis highlight direct challenges between program classification and the potential impact on student success. Recommendations for Practitioners. Research in this area is relevant for academic administrators, private sector executives and others working to increase the technology pipeline. Recommendations for Researchers. Researchers may benefit by exploring thematic analysis as a means of generating relevant classifications and taxonomies that highlight opportunities for improvement in a broad set of subject areas. Impact on Society. Research in this area can serve as a catalyst to increase graduation rates in programs related to technology and engineering. Future Research. This area would benefit from further research by comparing program success rates within varied disciplines. Future research may also produce a classification process.




info

The Academic Discipline of Information Technology: A Systematic Literature Review

Aim/Purpose. This paper aims to answer the research question, “What are the development phases of the academic discipline of information technology in the United States?” This is important to understand the reason for the growing talent gap in the information technology (IT) industry by reviewing the evolution of information technology across time, how the discipline was formed, evolved, and gained independence from other information and computing disciplines. Background. The COVID-19 pandemic has increased the shortage of IT professionals in the workplace. The root reason for this talent shortage requires understanding from both industry and academic perspectives in order to implement effective initiatives to prepare, recruit, and retain diverse IT professionals at an early stage. Methodology. This paper used a systematic literature review methodology and retrieved 143 primary studies from the ACM and IEEE Xplore digital libraries to review the development phases of the IT discipline as a contributing factor in understanding why, when, and how the population of professionals in IT and other relevant computing disciplines has changed and continues to fluctuate. Thematic analysis was applied to the abstracts of the primary studies, which spanned the period of 1982 to 2021. Contribution. This paper contributes to the understanding of the discipline of IT in the US and contributes foundations to researchers and educators who are working on strategies to fill the talent gap. Findings. Based on the thematic analysis in this paper, the academic discipline of IT has evolved over four phases across a timeline from 1982 to 2021. These phases were: Phase 1 (1982-1991) – Advent of Information Technology; Phase 2 (1992-2001) – Industry IT & DevOps; Phase 3 (2002-2011) – Information Technology and Management in Evolving Industry, Academia, and Research Areas; and Phase 4 (2011-2021) – Information Technology Research & Education. Recommendations for Practitioners. IT occupies an independent disciplinary space from computer science, computer engineering, and information systems. The paper suggests that practitioners seeking to fill the talent gap in IT invest in enabling its academic programs. Recommendations for Researchers. The depth of the IT disciplinary space and its continued evolution over time is ready for exploration. Continued research in this area may yield a better understanding of its role in society, the skills needed to succeed, and how to build programs to empower students with these skills. Impact on Society. Examining the discipline of IT and understanding its independence and interrelated connection with other computing disciplines will help address the shortfalls in academia across the nation by identifying the distinction between each discipline and creating comprehensive programs, degrees, and curricula suitable for various students and professionals across all educational levels. Future Research. Future research will integrate papers’ introductions and conclusions in addition to abstracts, increase the number of databases and reviewers, as well as incorporate papers that focus on other information and computing disciplines such as computer science and information systems to explore the possibility that IT as a discipline was initially practiced in an existing information or computing discipline before it gained independence.




info

Table of Contents: Issues in Informing Science and Informing Technology. Volume 20, 2023

Table of Contents for IISIT Volume 20, 2023




info

Information and Communications Technology and Resilience of First-Generation Students Compared to Students with Educated Parents

Aim/Purpose. In this study, we examined, from the perspective of the participants, aspects of information and communications technology (ICT) and resilience, comparing first-generation students in higher education with students whose parents had higher education. Methodology. We examined self-image, motivation, happiness, and the use of ICT. This was a quantitative study. Respondents answered a questionnaire that contained open and closed questions. The sample included 307 students from academic institutions in Israel between the ages of 18 and 64. Findings. The findings were grouped into four clusters: (a) second-generation students under the age of 25 years, members of Generation Z; (b) second-generation students over the age of 25; (c) first-generation students over the age of 25 years (the largest group in the sample), mostly members of the Generation Y; and (d) first-generation students under the age of 25. We found consistent differences on all scales between the group of first-generation students over the age of 25 years and those in the other groups. The research findings indicate that the group with the highest resilience was students who were the first generation acquiring higher education and were over 25, mostly members of the Y generation. Impact on Society. This research allows an instructive look at Generation Y and Generation Z and the academic abilities of this generation. Future Research. Future studies should examine the correlation between a sense of resilience (which was examined in this study) and academic achievement (which was not).




info

Evolution of Information Technology in Industry: A Systematic Literature Review

Aim/Purpose. This study addresses the research question: “What are the developmental phases of Information Technology in the industry?” Existing research has explored the impact of Information Technology (IT) on specific industries. However, it is essential to understand the evolution of IT within industries, its influence on the workforce, and technological advancements. Addressing this knowledge gap will enhance future workforce development and IT integration across diverse sectors. Background. IT can significantly transform industries and drive innovation to meet client demands. Understanding IT phases in industry through literature helps governments and businesses worldwide recognize its importance. This knowledge can guide strategies to address the shortage of highly skilled workers by prioritizing education and training programs to meet future demands. Methodology The methodology involved a systematic literature review of 110 IEEE Xplore, ACM Digital Library, and Google Scholar articles. Thematic analysis was used to understand the development of IT in distinct phases since the 1990s. This development has resulted in a continuous demand for new workforce skills and evolving customer expectations. Contribution. This study aims to fill the knowledge gap by enhancing our understanding of how evolving IT influences the industry and shapes IT jobs and skills. It provides a historical perspective, illustrating how IT advancements have led to new applications to meet changing needs. Additionally, the study identifies patterns in the evolving IT skill requirements due to technological advancements and discusses implications for curriculum development and higher education. Findings. The study identified three significant phases through a systematic literature review and thematic analysis. The first phase, “Advent of Industry IT” (1990-2000), established the digital framework and built essential systems and infrastructure. The second phase, “Connectivity & Information Revolution” (2000-2010), saw exponential internet growth, transforming information access and communication. The third phase, “Emerging Industry IT” (2010-present), focuses on artificial intelligence, automation, and data-driven insights, continuing to disrupt and transform industries. Recommendations for Practitioners. The changing phases of IT within the industry should inform the development of innovative programs. These programs should address diverse skill sets across eras, preparing the workforce for evolving job roles in various sectors, such as healthcare in North America, automotive manufacturing in Japan, telecommunications in Africa, and innovations in other parts of the world. Recommendations for Researchers. Researchers can conduct longitudinal studies to explore the ongoing evolution of IT, tracking its trajectory beyond current delineated phases to understand future trends. Comparative studies across various industries can assess how IT evolution varies among sectors and delve deeper into its practical implications. Researchers can also conduct impact assessment studies to determine how various IT phases directly affect organizational strategy, worker dynamics, and organizational structures across industries. Examples include logistics in the Netherlands, retail in the United Kingdom, and agriculture in Brazil. Impact on Society. Policymakers and planners can use knowledge of these phases to predict technological shifts and industry trends. This knowledge helps develop strategies and policies supporting entrepreneurship, education and training alignment, technical innovation, economic growth, and job creation in line with the changing IT landscape. Examples of policies include Singapore’s Smart Nation initiative, Germany’s Industry 4.0 strategy, Ghana’s digitization efforts, and India’s Digital India campaign. Future Research. Future research can provide a thorough understanding of the evolutionary patterns of IT within sectors by validating the study through various datasets and conducting in-depth examinations of individual industries. This will contribute to a deeper understanding of sector-specific IT evolution and their varying impact on societal interactions and industry dynamics. Comparative studies across various sectors, such as logistics in the Netherlands, retail in the United Kingdom, and agriculture in Brazil, can assess how IT evolution varies.




info

Information Technology in Healthcare: A Systematic Literature Review

Aim/Purpose. The aim of this study is to recognize the factors that contributed to the development of IT in the healthcare industry. Background. The healthcare Information Technology (IT) solutions market has experienced remarkable growth, with the healthcare sector emerging as a $303 billion industry. However, despite its substantial size, the healthcare industry has faced criticism for its slow adoption of innovative technologies. This study aims to explore factors driving the evolution of IT in the healthcare sector. Methodology. The researchers conducted a systematic literature review, searching the PubMed and Emerald databases for relevant peer-reviewed articles. After filtering based on defined criteria, 433 articles were included for analysis. Thematic analysis was applied to the abstract of articles which spanned the period of 1997 to 2023. Contribution. This study provides a conceptual framework elucidating the key factors driving the evolution of IT in the healthcare industry. By systematically analyzing the existing literature, the research identifies four overarching themes – government policies, technological potentials, healthcare delivery needs, and organizational motivations – that have propelled the development and adoption of healthcare IT solutions. Provide a conceptual model for understanding, and design of the healthcare it solutions. Findings. Based on the analysis in this paper, four themes emerged: government policies promoting IT adoption through initiatives like incentives for electronic health records; technological breakthroughs enabling new healthcare IT capabilities; healthcare delivery needs to drive IT integration for improved quality and safety; and patient experience and organizational motivations to leverage IT for streamlining processes and knowledge management. Recommendations for Practitioners. The conceptual model can guide practitioners in developing IT solutions aligned with policy drivers, technological capabilities, care delivery needs, and organizational imperatives. Recommendations for Researchers. The conceptual framework developed in this study offers a lens for researchers across disciplines to continue investigating the role of information technology in the healthcare industry. Impact on Society. Examining the evolution of IT in the healthcare industry revealed the importance of information technology in enhancing the delivery and affordability of healthcare services and addressing issues of accessibility and inequality. Future Research. Future research will explore global perspectives showcasing the successful impact of IT on healthcare, as emerging technologies impact healthcare delivery and patient outcomes.




info

Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]

Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together.




info

Table of Contents: Issues in Informing Science and Informing Technology. Volume 21, 2024

Table of Contents for IISIT Volume 21, 2024




info

TQM for Information Systems: Are Indian Organizations Ready?




info

Integrated Information Systems - A Challenge for Long-Term Digital Preservation




info

The Technology Ownership and Information Acquisition Habits of HBCU Freshmen




info

Information Retrieval Systems: A Human Centered Approach




info

Framework for Quality Metrics in Mobile-Wireless Information Systems




info

A Guided Approach for Personalized Information Search and Visualization




info

Decision Making for Predictive Maintenance in Asset Information Management




info

Information Quality and Absorptive Capacity in Service and Product Innovation Processes




info

Adaptive Innovation and a MOODLE-based VLE to Support a Fully Online MSc Business Information Technology (BIT) at the University of East London (UEL)




info

Can We Help Information Systems Students Improve Their Ethical Decision Making?




info

Generativity: The New Frontier for Information and Communication Technology Literacy




info

Simulation Modeling of an Iron Ore Operation to Enable Informed Planning




info

A Return on Investment as a Metric for Evaluating Information Systems: Taxonomy and Application




info

Back to Basics of Informing: The INIS Principle




info

Assessment of Risk of Misinforming: Dynamic Measures




info

A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research




info

Barriers to the Effective Deployment of Information Assets: An Executive Management Perspective




info

A Comparison of International Information Security Regulations




info

The Survey of Information Systems in Public Administration in Poland




info

Change management in information systems projects for public organizations

It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work.




info

Challenges of Knowledge and Information Management during New Product Introduction: Experiences from a Finnish Multinational Company

Efficient knowledge and information management is essential for companies to prosper in the rapidly changing global environment. This article presents challenges of a large Finnish multinational company relating to their current knowledge and information management practices and systems. The focus is on New Product Introduction (NPI) process. The study is based on interviews and facilitated workshops in the Research and Development (R&D) and Production departments. Furthermore, the identified challenges are reflected to the findings presented in knowledge and information management literature. The results gained from the company case study were well in line with the findings in the literature. Three main topics, which can be generalized to cause challenges for knowledge and information management in most companies, were recognized: 1) Issues related to human behavior, individual characteristics and capabilities, different backgrounds, and professional vocabulary; 2) Codifying tacit knowledge into explicit information, which can be saved to company information system; 3) Lack of interoperability between different information systems. The study provides the management of the case company, and other similar organizations, focus points while seeking for better knowledge and information management. From a scientific perspective, the main contribution of this article is to give practical examples of how the theoretical findings presented in literature manifest themselves in real industrial practices.




info

Doing the Organizational Tango: Symbiotic Relationship between Formal and Informal Organizational Structures for an Agile Organization

This paper reports on research with a broad objective to examine the relationship between two organizational entities, the formally structured organization and informal organizational structures, in a changing operational environment, more specifically during military deployments. The paper draws on organizational and complexity paradigms; based on empirical evidence obtained through qualitative techniques, it describes mechanisms that enable a symbiotic relationship between these two organizational structures in a complex operational landscape. Substantive findings provide insights into the dynamics of the interactions between these structures and illuminate the relationship between three enabling factors – accountability, responsible autonomy, and command and control arrangements – that need to be considered to fully exploit the strengths inherent in both formal and informal structures. Based on these findings, a model for enhancement of organizational agility in response to changes in a complex operational environment is described. The model is predicated on feedback and mutual adjustment of the organization, institution and individual through sensemaking; it illustrates the dynamic nature of interactions that are required for such a response.




info

Accounting Information Systems Effectiveness: Evidence from the Nigerian Banking Sector

Aim/Purpose: The purpose of this study is to investigate the interrelationship among the quality measures of information system success, including system quality, information, quality, and service quality, that eventually influence accounting information systems effectiveness. Background: It is generally believed that investment in an information system offers opportunities to organizations for business process efficiency and effectiveness. Despite huge investments in accounting information systems, banks in Nigeria have not realized the full potential benefits of using these systems because of persistent failures. Few studies have been conducted to address the problem. Methodology: A survey research design was used to collect data, and a total of 287 questionnaires were retrieved from respondents in the Nigerian banking sector. Contribution: This study contributes to the understanding of the most important antecedent factors of the quality measures, the interrelationship among the quality measures, and the influence of these measures on the accounting information systems effectiveness. Findings: The result of the study revealed that security, ease of use, and efficiency are key features of system quality, while the information quality dimension includes accuracy, timeliness, and completeness. The result of the study further revealed that information quality and system quality have significant influences on accounting information systems effectiveness. Recommendations for Practitioners: This study provides practitioners with important measures for evaluation of AIS effectiveness in the context of Nigerian banks. Recommendation for Researchers: Future researchers may build on the findings of current study to conduct fur-ther research in the area of AIS effectiveness in different contexts. Future Research: This study examines only three quality measures of Delone and Mclean model and antecedents of information and system quality measures, neglecting contingency factor. Therefore, future study should include other factors to the AIS effectiveness model to help in developing more specific theory in AIS domain.




info

Understanding Internal Information Systems Security Policy Violations as Paradoxes

Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful.




info

The Mechanism of Internet Capability Driving Knowledge Creation Performance: The Effects of Strategic Flexibility and Informatization Density

Aim/Purpose: This study analyzes the mechanism of Internet capability (IC) driving knowledge creation performance (KCP). We consider the mediating role of strategic flexibility and the moderating role of informatization density. Background: The key to achieving KCP for firms is to transform knowledge created into new products or services and to realize the economic benefits. However, the research has not paid enough attention to firms’ KCP. Based on dynamic capability theory, this study empirically reveals how firms drive KCP through Internet capability. Methodology: The study uses survey data from 399 organizations in China. Through structural equation modeling, this study assesses the relationship between Internet capability, strategic flexibility, and KCP and uses hierarchical regression to test the moderating role of informatization density. Contribution: First, this study expands research on knowledge creation and focuses on the further achievement of knowledge creation performance. The study also enriches the exploration of KCP in the Internet context and deepens the research on the internal mechanism by which Internet capability influences KCP. Second, this study highlights the important role of informatization density in the Internet context and expands the research on the impact of external factors on the internal mechanism. Findings: First, Internet capability has a significantly positive effect on both strategic flexibility and KCP. Furthermore, Internet capability directly impacts strategic flexibility, yet it affects KCP both directly and indirectly through strategic flexibility, which confirms that strategic flexibility is a partial mediator in the relationship between Internet capability and KCP. Second, strategic flexibility positively influences KCP. Third, informatization density has a significant moderating effect on the relationship between Internet capability and KCP. Recommendations for Practitioners: The results indicate that firms should consider the importance of Internet capability and strategic flexibility for KCP in the Internet context. This study also provides a theoretical basis that could guide the Chinese government’s informatization construction of the industrial chain. Recommendation for Researchers: Researchers could further explore the role of other mediator variables (e.g., business process management, organizational agility) and consider the role of other moderator variables (e.g., resource commitment, learning orientation). Impact on Society: This study provides a reference for enterprises with similar cultural backgrounds in using Internet capability to enhance their competitive advantage. Future Research: Future research could collect data from various countries and regions to test the research model and conduct longitudinal studies to increase the robustness of the conclusions.




info

A Thematic Analysis of Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM)

Aim/Purpose: This study investigates the research profile of the papers published in Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM) to provide silhouette information of the journal for the editorial team, researchers, and the audience of the journal. Background: Information and knowledge management is an interdisciplinary subject. IJIKM defines intersections of multiple disciplinary research communities for the interdisciplinary subject. Methodology: A quantitative study of categorical content analysis was used for a thematic analysis of IJIKM. One hundred fifty nine (159) papers published since the inauguration of the journal in 2006 were coded and analyzed. Contribution: The study provides synopsized information about the interdisciplinary research profile of IJIKM, and adds value to the literature of information and knowledge management. Findings: The analysis reveals that IJIKM disseminates research papers with a wide range of research themes. Among the research themes, Organizational issues of knowledge/information management, Knowledge management systems/tools, Information/knowledge sharing, Technology for knowledge/information management, Information/knowledge application represent the five main research streams of IJIKM. The total number of papers on organizational issues of knowledge/information management increased from 16% to 28% during the past 6 years. Statistical method was the most common research methodology, and summarization was the most common research design applied in the papers of IJIKM. The paper also presents other patterns of participant countries, keywords frequencies, and reference citations. Recommendations for Practitioners: Innovation is the key to information and knowledge management. Practitioners of information and knowledge management can share best practices with external sectors. Recommendation for Researchers: Researchers can identify opportunities of cross-disciplinary research projects that involve experts in business, education, government, healthcare, technology, and psychology to advance knowledge in information and knowledge management. Impact on Society: Information and knowledge management is still a developing field, and readers of this paper can gain more understanding of the dissemination of the literature of information and knowledge management involved in all relevant disciplines. Future Research: A longitudinal study could follow up in the future to provide updated and comparative information of the research profile of the journal.




info

Reinforcing Consumers’ Impulsive Buying Tendencies through M-Devices and Emails in Pakistan

Aim/Purpose: The current study investigates the relationship between mobile and email marketing and consumer impulse buying tendencies in Pakistan. Background: Technology has become a primary driver for all business operations, which has dramatically transformed the wireless communications marketing paradigm. However, researchers have claimed that further inquiry is still needed to explore the role that distinct and emerging global technologies have on marketing communication strategies. This study explores the linkage of mobile and email marketing on consumers’ impulse buying behavior in Pakistan. Methodology: Primary data were collected through the distribution of 1000 questionnaires among students of different universities within two provinces of Pakistan: Punjab and Khyber Pakhton Khan (KPK). The study was conducted between November 2016 and March 2017. The authors received back 950 surveys, which is a very significant rate of return (95%). Of those submitted, 900 surveys were deemed eligible for analysis after improper documents were eliminated. Structure equation modeling (SEM) was utilized to test the study’s hypotheses. Contribution: This study assists organizations in improving marketing campaigns by focusing more on mobile devices (m-devices) and email medium to better comprehend consumers’ assessment processes at a lower budgetary cost. Such digital considerations could provide innovative possibilities for marketers in approaching their target market by adopting novel methods for information sharing. Findings: The findings revealed a positive association between mobile and email marketing on consumers’ impulse buying tendencies. The comprehensive analysis affirmed; however, there is a higher positive relationship of mobile marketing results compared to email marketing outcomes. There are favorable benefits in considering such emerging methods in marketing communications as promotional strategies are considered by organizations. Recommendations for Practitioners: Marketers are encouraged to evaluate the potential of using both emerging mediums to take advantage of consumer impulse buying habits where m-devices and emails approaches are utilized. Future Research: Future inquiries might examine the global influence of m-devices and email technology toward other buying tendencies of consumers: exploratory, online, variety seeking, habitual, and other emerging complex on-demand buying behavior.




info

The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector

Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems.




info

Information Technology Capabilities and SMEs Performance: An Understanding of a Multi-Mediation Model for the Manufacturing Sector

Aim/Purpose: Despite the fact that the plethora of studies demonstrate the positive impact of information technology (IT) capabilities on SMEs performance, the understanding of underlying mechanisms through which IT capabilities affect the firm performance is not yet clear. This study fills these gaps by explaining the roles of absorptive capacity and corporate entrepreneurship. The study also elaborates the effect of IT capability dimensions (IT integration and IT alignment) upon the SMEs performance outcomes through the mediating sequential process of absorptive capacity and corporate entrepreneurship. Methodology: This study empirically tests a theoretical model based on the Dynamic Capability View (DCV), by using the partial least square (PLS) technique with a sample of 489 manufacturing SMEs in Pakistan. A survey is employed for the data collection by following the cluster sampling approach. Contribution: This research contributes to the literature of IT by bifurcating the IT capability into two dimensions, IT integration and IT alignment, which allows us to distinguish between different sources of IT capabilities. Additionally, our findings shed the light on the dynamic capability view by theoretically and empirically demonstrating how absorptive capacity and corporate entrepreneurship sequentially affect the firms' performance outcomes. At last, this study contributes to the literature of SMEs by measuring the two levels of performance: innovation performance and firm performance. Findings: The results of the analysis show that the absorptive capacity and the corporate entrepreneurship significantly mediate the relationship between both dimensions of IT capability and performance outcomes.




info

Reinforcing Innovation through Knowledge Management: Mediating Role of Organizational Learning

Aim/Purpose: The purpose of this study is to investigate the relationship between knowledge management (KM) and organizational innovation (OI). It also enriches our understanding of the mediating effect of organizational learning (OL) in this relationship. Background: KM’s relationship with OL and OI has been tackled extensively in developed countries’ literature. Nowadays, the challenges of developing countries lie in the process of knowledge application. This study attempts to develop a new managerial knowledgeable tool and present a theoretical model and empirical analysis of the relationship between KM and innovation in Jordan, a developing country. To the knowledge of the author, no attempt has been taken to investigate this relationship in any Jordanian sector. Methodology: The sample of this study consists of 457 managers representing strategic, tactical, and operational levels randomly selected from 56 manufacturing companies in Jordan. A questionnaire-based survey has been developed based on KM, OL and OI literature to collect data. A structural equation modeling (SEM) approach was applied to investigate the proposed research model. Contribution: This study contributes to the literature in different ways. First, it asserts that OL assists in improving OI in manufacturing organization of developing countries. Second, it highlights the substantial benefits of applying KM, OL and OI in manufacturing companies in Jordan. Furthermore, it enhances the relationship between KM and innovativeness’ literature by providing empirical evidence, suggesting that OL is as important as KM to advance organizational innovation. Most importantly, it identifies the problem of a developing economy which is not promoting OL or taking care of it as much as they attended to KM in their organizational practices. Findings: Study findings indicate that the relationship between KM and OI is significantly positive. Results also reveal that the relationship between KM and organizational learning is significantly positive. Empirical results emerging from this study indicate that there is partial mediation to support the relationship between OL and OI. Recommendations for Practitioners: This study suggests that managers ought to recognize that organizational learning is equally important to KM. This entails that OL should be utilized within organizations to achieve organizational innovation. Moreover, managers ought to comprehend their importance and encourage their employees to adopt knowledge from various sources; which, if implemented correctly, will enhance the OL environment. Recommendation for Researchers: The research model can be used or applied in different manufacturing and service sectors across the globe. The findings of the current study can serve as a foundation to perform different studies to understand KM processes and recognize its antecedence. Impact on Society: This study presents insights on how to apply KM, OL and OI methodologies in Jordanian manufacturing companies to achieve a competitive advantage; hence, positively influencing society. Future Research: Future research may include conducting a similar study in the context of developed countries and developing countries which allows for comparison. Also, future research may examine the impact of KM on organizational performance applying both OL and OI as mediating variables.




info

The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel

Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter.




info

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




info

An Augmented Infocommunication Model for Unified Communications in Situational Contexts of Collaboration

Aim/Purpose: In this work, the authors propose an augmented model for human-centered Unified Communications & Collaboration (UC&C) product design and evaluation, which is supported by previous theoretical work. Background: Although the goal of implementing UC&C in an organization is to promote and mediate group dynamics, increasing overall productivity and collaboration; it does not seem to provide a solution for effective communication. It is clear that there is still a lack of consideration for human communication processes in the development of such products. Methodology: This paper is sustained by existing research to propose and test the application of an augmented model capable of supporting the design, development and evaluation of UC&C services that can be driven by the human communication process. To test the application of the augmented model in UC&C service development, a proof-of-concept mobile prototype was elaborated upon and evaluated, making use of User Experience (UX) and user-centred methods and techniques. A total of nine testing sessions were carried out in an organizational communication setup and recorded with eye tracking technology. Contribution: The authors argue that UC&C services should look at the user’s (human) natural processes to improve effective infocommunication and thus enhance collaboration. Authors believe this augmented version of the model will pave the way improving the research and development of useful and practical infocommunication products, capable of truly serving users’ needs. Findings: On evaluation of the prototype, qualitative data analysis uncovered structural problems in the proposed prototype which hindered the augmented model’s elements and subsequently, the user experience. Five out of eighteen identified interaction issues are highlighted in this paper to demonstrate the proposed augmented model’s validity, applied in UC&C services evaluation. Recommendations for Practitioners: Considering and respecting the user’s natural communication processes, practitioners should be able to propose and develop innovative solutions that truly enable and empower effective organizational collaboration. UC&C functionalities should be designed, taking the augmented model’s proposed elements and their pertinence in representing the human interpersonal communication phenomena into consideration, namely: Social Presence; Immediacy of Communication; Concurrency and Synchronicity. Recommendation for Researchers: This paper intends to demonstrate that the adoption and use of UTAUT technology characteristics, in conjunction with Synchronicity proposition, can be considered as a reference for human-centric design and the evaluation of UC&C systems. Impact on Society: To highlight the need to develop further research on this important topic of human collaboration mediated by technology inside organizations. Future Research: This research focused its attention on communication functionalities. However, collaboration can potentially be affected by other services that may be included in a UC&C system, such as scheduling, meetings or task management. Future research could consider employing this augmented model to evaluate such systems or proof-of-concept prototypes.




info

Towards a Framework on the Use of Infomediaries in Maternal mHealth in Rural Malawi

Aim/Purpose: The aim of the study is to explore factors that affect how healthcare clients in rural areas use infomediaries in maternal mHealth interventions. The study focuses on maternal healthcare clients who do not own mobile phones but use the mHealth intervention. Background: Maternal mHealth interventions in poor-resource settings are bedevilled by inequalities in mobile phone ownership. Clients who do not own mobile phones risk being excluded from benefiting from the interventions. Some maternal mHealth providers facilitate the access of mobile phones for those who do not own them using “infomediaries”. Infomediaries, in this case, refer to individuals who have custody of mobile phones that other potential beneficiaries may use. However, the use of infomediaries to offer access to the “have nots” may be influenced by a number of factors. Methodology: The study uses a case of a maternal mHealth intervention project in Malawi, as well as a qualitative research method and interpretive paradigm. Data was collected using secondary data from the implementing agency, semi-structured interviews, and focus group discussions. Empirical data was collected from maternal healthcare clients who do not own mobile phones and infomediaries. Data were analysed inductively using thematic analysis. Contribution: The study proposed a theoretical framework for studying infomediaries in ICT4D. The study may inform mHealth designers, implementers, and policymakers on how infomediaries could be implemented in a rural setting. Consequently, understanding the factors that affect the use of infomediaries may inform mHealth intervention implementers on how they could overcome the challenges by implementing mHealth interventions that reduce the challenges on the mHealth infomediaries side, and the maternal healthcare clients’ side. Findings: Characteristics of the maternal healthcare client, characteristics of the mHealth infomediary, perceived value of mHealth intervention, and socio-environmental factors affect maternal healthcare clients’ use of mHealth infomediaries. Recommendations for Practitioners: Implementers of interventions ought to manage the use of infomediaries to avoid volunteer fatigue and infomediaries who may not be compatible with the potential users of the intervention. Implementers could leverage traditional systems of identifying and using infomediaries instead of reinventing the wheel. Recommendation for Researchers: This research adopted a single case study to develop the theoretical framework for mHealth infomediary use. We recommend future studies are conducted in order to test and develop this framework further, not only in ICT4D, but also in other areas of application. Impact on Society: People still lack access. The lack of ownership of technology may still exclude them from participating in an information society. The use of infomediaries may help to provide access to technologies to those who do not have them thereby bridging the digital divide gap. Future Research: We propose herein that traditional systems may offer a good starting point for designing a system that would work for communities. We, therefore, recommend that future research may explore these possibilities.




info

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




info

Determinants of Knowledge Transfer for Information Technology Project Managers: A Systematic Literature Review

Aim/Purpose: The purpose of this study is to identify the key determinants hindering Knowledge Transfer (KT) practices for Information Technology Project Managers (ITPMs) Background: The failure rate of IT projects remains unacceptably high worldwide, and KT between project managers and team members has been recognized as a significant issue affecting project success. Therefore, this study tries to identify the determinants of KT within the context of IT projects for ITPMs. Methodology: A systematic review of the literature (SLR) was employed in the investigation. The SLR found 28 primary studies on KT for ITPMs that were published in Scopus and Web of Science databases between 2010 and 2023. Contribution: Social Cognitive Theory (SCT) was used to build a theoretical framework where the determinants were categorized into Personal factors, Environmental (Project organizational) factors, and other factors, such as Technological factors influencing ITPMs (Behavioral factors), to implement in KT practices. Findings: The review identified 11 key determinants categorized into three broad categories: Personal factors (i.e., motivation, absorptive capability, trust, time urgency), Project Organizational factors (i.e., team structure, leadership style, reward system, organizational culture, communication), and Technological factors (i.e., project task collaboration tool and IT infrastructure and support) that influence implementing KT for ITPMs Recommendations for Practitioners: The proposed framework in this paper can be used by project managers as a guide to adopt KT practices within their project organization. Recommendation for Researchers: The review showed that some determinants, such as Technological factors, have not been adequately explored in the existing KT model in the IT projects context and can be integrated with other relevant theories to understand how a project manager’s knowledge can be transferred and retained in the organization using technology in future research. Impact on Society: This study emphasizes the role of individual actions and project organizational and technological matters in shaping the efficacy of KT within project organizations. It offers insight that could steer business owners or executives within project organizations to closely observe the behavior of project managers, thereby securing successful project outcomes. Future Research: The determinant list provided in this paper is acquired from extensive SLR and, therefore, further research should aim to expand and deepen the investigation by validating these determinants from experts in the field of IT and project management. Future studies can also add other external technological determinants to provide a more comprehensive KT implementation framework. Similarly, this research does not include determinants identified directly from the industry, as it relies solely on determinants found in the existing literature. Although a comprehensive attempt has been made to encompass all relevant papers, there remains a potential for overlooking some research in this process.




info

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




info

The Influence of COVID-19 on Employees’ Use of Organizational Information Systems

Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis.




info

How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data

Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns. Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors. Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality. Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables. Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor. Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy. Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor.