format

Barriers to the Effective Deployment of Information Assets: An Executive Management Perspective




format

Boosting Creativity with Transformational Leadership in Fuzzy Front-end Innovation Processes




format

A Comparison of International Information Security Regulations




format

The Survey of Information Systems in Public Administration in Poland




format

Change management in information systems projects for public organizations

It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work.




format

Challenges of Knowledge and Information Management during New Product Introduction: Experiences from a Finnish Multinational Company

Efficient knowledge and information management is essential for companies to prosper in the rapidly changing global environment. This article presents challenges of a large Finnish multinational company relating to their current knowledge and information management practices and systems. The focus is on New Product Introduction (NPI) process. The study is based on interviews and facilitated workshops in the Research and Development (R&D) and Production departments. Furthermore, the identified challenges are reflected to the findings presented in knowledge and information management literature. The results gained from the company case study were well in line with the findings in the literature. Three main topics, which can be generalized to cause challenges for knowledge and information management in most companies, were recognized: 1) Issues related to human behavior, individual characteristics and capabilities, different backgrounds, and professional vocabulary; 2) Codifying tacit knowledge into explicit information, which can be saved to company information system; 3) Lack of interoperability between different information systems. The study provides the management of the case company, and other similar organizations, focus points while seeking for better knowledge and information management. From a scientific perspective, the main contribution of this article is to give practical examples of how the theoretical findings presented in literature manifest themselves in real industrial practices.




format

Accounting Information Systems Effectiveness: Evidence from the Nigerian Banking Sector

Aim/Purpose: The purpose of this study is to investigate the interrelationship among the quality measures of information system success, including system quality, information, quality, and service quality, that eventually influence accounting information systems effectiveness. Background: It is generally believed that investment in an information system offers opportunities to organizations for business process efficiency and effectiveness. Despite huge investments in accounting information systems, banks in Nigeria have not realized the full potential benefits of using these systems because of persistent failures. Few studies have been conducted to address the problem. Methodology: A survey research design was used to collect data, and a total of 287 questionnaires were retrieved from respondents in the Nigerian banking sector. Contribution: This study contributes to the understanding of the most important antecedent factors of the quality measures, the interrelationship among the quality measures, and the influence of these measures on the accounting information systems effectiveness. Findings: The result of the study revealed that security, ease of use, and efficiency are key features of system quality, while the information quality dimension includes accuracy, timeliness, and completeness. The result of the study further revealed that information quality and system quality have significant influences on accounting information systems effectiveness. Recommendations for Practitioners: This study provides practitioners with important measures for evaluation of AIS effectiveness in the context of Nigerian banks. Recommendation for Researchers: Future researchers may build on the findings of current study to conduct fur-ther research in the area of AIS effectiveness in different contexts. Future Research: This study examines only three quality measures of Delone and Mclean model and antecedents of information and system quality measures, neglecting contingency factor. Therefore, future study should include other factors to the AIS effectiveness model to help in developing more specific theory in AIS domain.




format

Understanding Internal Information Systems Security Policy Violations as Paradoxes

Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful.




format

The Mechanism of Internet Capability Driving Knowledge Creation Performance: The Effects of Strategic Flexibility and Informatization Density

Aim/Purpose: This study analyzes the mechanism of Internet capability (IC) driving knowledge creation performance (KCP). We consider the mediating role of strategic flexibility and the moderating role of informatization density. Background: The key to achieving KCP for firms is to transform knowledge created into new products or services and to realize the economic benefits. However, the research has not paid enough attention to firms’ KCP. Based on dynamic capability theory, this study empirically reveals how firms drive KCP through Internet capability. Methodology: The study uses survey data from 399 organizations in China. Through structural equation modeling, this study assesses the relationship between Internet capability, strategic flexibility, and KCP and uses hierarchical regression to test the moderating role of informatization density. Contribution: First, this study expands research on knowledge creation and focuses on the further achievement of knowledge creation performance. The study also enriches the exploration of KCP in the Internet context and deepens the research on the internal mechanism by which Internet capability influences KCP. Second, this study highlights the important role of informatization density in the Internet context and expands the research on the impact of external factors on the internal mechanism. Findings: First, Internet capability has a significantly positive effect on both strategic flexibility and KCP. Furthermore, Internet capability directly impacts strategic flexibility, yet it affects KCP both directly and indirectly through strategic flexibility, which confirms that strategic flexibility is a partial mediator in the relationship between Internet capability and KCP. Second, strategic flexibility positively influences KCP. Third, informatization density has a significant moderating effect on the relationship between Internet capability and KCP. Recommendations for Practitioners: The results indicate that firms should consider the importance of Internet capability and strategic flexibility for KCP in the Internet context. This study also provides a theoretical basis that could guide the Chinese government’s informatization construction of the industrial chain. Recommendation for Researchers: Researchers could further explore the role of other mediator variables (e.g., business process management, organizational agility) and consider the role of other moderator variables (e.g., resource commitment, learning orientation). Impact on Society: This study provides a reference for enterprises with similar cultural backgrounds in using Internet capability to enhance their competitive advantage. Future Research: Future research could collect data from various countries and regions to test the research model and conduct longitudinal studies to increase the robustness of the conclusions.




format

A Thematic Analysis of Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM)

Aim/Purpose: This study investigates the research profile of the papers published in Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM) to provide silhouette information of the journal for the editorial team, researchers, and the audience of the journal. Background: Information and knowledge management is an interdisciplinary subject. IJIKM defines intersections of multiple disciplinary research communities for the interdisciplinary subject. Methodology: A quantitative study of categorical content analysis was used for a thematic analysis of IJIKM. One hundred fifty nine (159) papers published since the inauguration of the journal in 2006 were coded and analyzed. Contribution: The study provides synopsized information about the interdisciplinary research profile of IJIKM, and adds value to the literature of information and knowledge management. Findings: The analysis reveals that IJIKM disseminates research papers with a wide range of research themes. Among the research themes, Organizational issues of knowledge/information management, Knowledge management systems/tools, Information/knowledge sharing, Technology for knowledge/information management, Information/knowledge application represent the five main research streams of IJIKM. The total number of papers on organizational issues of knowledge/information management increased from 16% to 28% during the past 6 years. Statistical method was the most common research methodology, and summarization was the most common research design applied in the papers of IJIKM. The paper also presents other patterns of participant countries, keywords frequencies, and reference citations. Recommendations for Practitioners: Innovation is the key to information and knowledge management. Practitioners of information and knowledge management can share best practices with external sectors. Recommendation for Researchers: Researchers can identify opportunities of cross-disciplinary research projects that involve experts in business, education, government, healthcare, technology, and psychology to advance knowledge in information and knowledge management. Impact on Society: Information and knowledge management is still a developing field, and readers of this paper can gain more understanding of the dissemination of the literature of information and knowledge management involved in all relevant disciplines. Future Research: A longitudinal study could follow up in the future to provide updated and comparative information of the research profile of the journal.




format

The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector

Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems.




format

Information Technology Capabilities and SMEs Performance: An Understanding of a Multi-Mediation Model for the Manufacturing Sector

Aim/Purpose: Despite the fact that the plethora of studies demonstrate the positive impact of information technology (IT) capabilities on SMEs performance, the understanding of underlying mechanisms through which IT capabilities affect the firm performance is not yet clear. This study fills these gaps by explaining the roles of absorptive capacity and corporate entrepreneurship. The study also elaborates the effect of IT capability dimensions (IT integration and IT alignment) upon the SMEs performance outcomes through the mediating sequential process of absorptive capacity and corporate entrepreneurship. Methodology: This study empirically tests a theoretical model based on the Dynamic Capability View (DCV), by using the partial least square (PLS) technique with a sample of 489 manufacturing SMEs in Pakistan. A survey is employed for the data collection by following the cluster sampling approach. Contribution: This research contributes to the literature of IT by bifurcating the IT capability into two dimensions, IT integration and IT alignment, which allows us to distinguish between different sources of IT capabilities. Additionally, our findings shed the light on the dynamic capability view by theoretically and empirically demonstrating how absorptive capacity and corporate entrepreneurship sequentially affect the firms' performance outcomes. At last, this study contributes to the literature of SMEs by measuring the two levels of performance: innovation performance and firm performance. Findings: The results of the analysis show that the absorptive capacity and the corporate entrepreneurship significantly mediate the relationship between both dimensions of IT capability and performance outcomes.




format

The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel

Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter.




format

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




format

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




format

NOTICE OF RETRACTION: The Influence of Ethical and Transformational Leadership on Employee Creativity in Malaysia's Private Higher Education Institutions: The Mediating Role of Organizational Citizenship Behaviour

Aim/Purpose: ************************************************************************ After its investigation, the Research Ethics, Integrity, and Governance team at RMIT University found that the primary author of this paper breached the Australian Code and/or RMIT Policy and requested that the article be retracted. ************************************************************************** This paper aimed to examine the influence of ethical and transformational leadership on employee creativity in Malaysia’s private higher education institutions (PHEIs) and the mediating role of organizational citizenship behavior. Background: To ensure their survival and success in today’s market, organizations need people who are creative and driven. Previous studies have demonstrated the importance of ethical leadership in fostering employee innovation and good corporate responsibility. Research on ethical leadership and transformational leadership, in particular, has played a significant role in elucidating the role of leadership in relation to organizational citizenship behavior (OCB). In this study, we have focused on ethical and transformational leadership as an antecedent for enhancing employee creativity. Despite an increase in leadership research, little is known about the underlying mechanisms that link ethical leadership and transformational leadership to OCB. Because it sheds light on factors other than ethical leadership and transformational leadership that influence employees’ extra-role activity, this research is relevant theoretically. OCB may have a mediating function between ethical leadership and transformational leadership style and employee creativity because it is associated with the greatest outcomes, but empirical research has yet to prove this. So, one of the study’s goals is to add to the hypotheses about how ethical leadership style and transformational leadership affect employee creativity by using an important mediating variable – OCB. Methodology: This study adopted a quantitative approach based on a cross-sectional survey and descriptive design to gather the data in a specific period. A convenient sampling approach was used to gauge 275 employees from Malaysia’s PHEIs. To test the hypotheses and obtain a conclusion, the acquired data was analyzed using the partial least square technique (PLS-SEM). Contribution: The study contributes to leadership literature by advancing OCB as a mediating factor that accounts for the link between ethical and transformational leadership and employee creativity in the higher education sector. Findings: According to the research, OCB has a substantial influence on the creativity of employees. Furthermore, ethical leadership boosted OCB and boosted employee creativity, according to the research. OCB and employee creativity have both been demonstrated to benefit greatly from transformational leadership. Further research revealed that OCB is a mediating factor in the link between leadership styles and creative thinking among employees. Recommendations for Practitioners: Higher education institutions should focus on developing leaders who value transparency and self-awareness in their interactions with followers and who demonstrate an inner moral perspective in addition to balanced information processing to ensure positive outcomes at the individual and organizational levels. Higher education institutions should place a priority on hiring leaders that exhibit ethical and transformational traits to raise awareness of these leadership styles among employees. Recommendation for Researchers: The new study also adds significantly to the body of knowledge by examining the relationship between ethical and transformational leadership and the creativity of the workforce. It aimed to identify the relationship between transformational leadership style and individual creativity in higher education by examining the mediating influence of OCB. Impact on Society: Higher education institutions should devise strategies for developing ethical and transformative leaders who will assist boost OCB and creativity within their workforce. Students and faculty in higher education can benefit from these leadership methods by learning to think in more diverse ways and by developing thought processes that lead to a larger pool of innovative ideas and solutions. As a consequence, employees who show creative behavior may be effectively managed by leaders who utilize ethical and transformational leadership styles and motivate them to show OCB that allow them to solve creative problems creatively. Future Research: A mixed-methods approach should be used in future research, and this should be done in public institutions in developing and developed nations to put the findings to use and generalize them even further. Future research will be able to examine other mediators to learn more about how and why ethical and transformational leadership styles affect PHEI employees’ creativity.




format

Determinants of Knowledge Transfer for Information Technology Project Managers: A Systematic Literature Review

Aim/Purpose: The purpose of this study is to identify the key determinants hindering Knowledge Transfer (KT) practices for Information Technology Project Managers (ITPMs) Background: The failure rate of IT projects remains unacceptably high worldwide, and KT between project managers and team members has been recognized as a significant issue affecting project success. Therefore, this study tries to identify the determinants of KT within the context of IT projects for ITPMs. Methodology: A systematic review of the literature (SLR) was employed in the investigation. The SLR found 28 primary studies on KT for ITPMs that were published in Scopus and Web of Science databases between 2010 and 2023. Contribution: Social Cognitive Theory (SCT) was used to build a theoretical framework where the determinants were categorized into Personal factors, Environmental (Project organizational) factors, and other factors, such as Technological factors influencing ITPMs (Behavioral factors), to implement in KT practices. Findings: The review identified 11 key determinants categorized into three broad categories: Personal factors (i.e., motivation, absorptive capability, trust, time urgency), Project Organizational factors (i.e., team structure, leadership style, reward system, organizational culture, communication), and Technological factors (i.e., project task collaboration tool and IT infrastructure and support) that influence implementing KT for ITPMs Recommendations for Practitioners: The proposed framework in this paper can be used by project managers as a guide to adopt KT practices within their project organization. Recommendation for Researchers: The review showed that some determinants, such as Technological factors, have not been adequately explored in the existing KT model in the IT projects context and can be integrated with other relevant theories to understand how a project manager’s knowledge can be transferred and retained in the organization using technology in future research. Impact on Society: This study emphasizes the role of individual actions and project organizational and technological matters in shaping the efficacy of KT within project organizations. It offers insight that could steer business owners or executives within project organizations to closely observe the behavior of project managers, thereby securing successful project outcomes. Future Research: The determinant list provided in this paper is acquired from extensive SLR and, therefore, further research should aim to expand and deepen the investigation by validating these determinants from experts in the field of IT and project management. Future studies can also add other external technological determinants to provide a more comprehensive KT implementation framework. Similarly, this research does not include determinants identified directly from the industry, as it relies solely on determinants found in the existing literature. Although a comprehensive attempt has been made to encompass all relevant papers, there remains a potential for overlooking some research in this process.




format

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




format

The Influence of COVID-19 on Employees’ Use of Organizational Information Systems

Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis.




format

How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data

Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns. Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors. Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality. Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables. Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor. Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy. Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor.




format

Modeling the Predictors of M-Payments Adoption for Indian Rural Transformation

Aim/Purpose: The last decade has witnessed a tremendous progression in mobile penetration across the world and, most importantly, in developing countries like India. This research aims to investigate and analyze the factors influencing the adoption of mobile payments (M-payments) in the Indian rural population. This, in turn, would bring about positive changes in the lives of people in these countries. Background: A conceptual framework was worked upon using UTAUT as a foundation, which included constructs, namely, facilitating conditions, social influences, performance expectancy, and effort expectancy. The model was further extended by incorporating the awareness construct of m-payments to make it more comprehensive and to understand behavioral intentions and usage behavior for m-payments in rural India. Methodology: A questionnaire-based study was conducted to collect primary data from 410 respondents residing in rural areas in the state of Punjab. Convenience sampling was conducted to collect the data. Structural equation modeling was used to conduct statistical analysis, including exploratory and confirmatory factor analyses. Contribution: A new conceptual model for M-payments adoption in rural India was developed based on the study’s findings. Using the findings of the study, marketers, policymakers, and academicians can gain insight into the factors that motivate the rural population to use M-payments. Findings: The study has found that M-payment Awareness (AW) is the strongest factor within the proposed model for deeper diffusion of M-payments in rural areas in the state of Punjab. Performance expectancy (PE), effort expectancy (EE), social influences (SI), and facilitating conditions (FC) are also positively and significantly related to behavioral intentions for using M-payments among the Indian rural population in the state of Punjab. Recommendations for Practitioners: M-payments are emerging as a new mode of transactions among the Indian masses. The government needs to play a pivotal role in advocating the benefits linked with the usage of M-payments by planning financial literacy and awareness campaigns, promoting transparency and accountability of the intermediaries, and reducing transaction costs of using M-payments. Mobile manufacturing companies should come up with devices that are easy to use and incorporate multilanguage mobile applications, especially for rural areas, as India is a multi-lingual country. A robust regulatory framework will not only shape consumer trust but also prevent privacy breaches. Recommendation for Researchers: It is recommended that a comparative study among different M-payment platforms be conducted by exploring constructs such as usefulness and ease of use. However, the vulnerability of data leakage may result in insecurity and skepticism about its adoption. Impact on Society: India’s rural areas have immense potential for adoption of M-payments. Appropriate policies, awareness drives, and necessary infrastructure will boost faster and smoother adoption of M-payments in rural India to thrive in the digital economy. Future Research: The adapted model can be further tested with moderating factors like age, gender, occupation, and education to understand better the complexities of M-payments, especially in rural areas of India. Additionally, cross-sectional studies could be conducted to evaluate the behavioral intentions of different sections of society.




format

The Relationship Between Electronic Word-of-Mouth Information, Information Adoption, and Investment Decisions of Vietnamese Stock Investors

Aim/Purpose: This study investigates the relationship between Electronic Word-of-Mouth (EWOM), Information Adoption, and the stock investment of Vietnamese investors. Background: Misinformation spreads online, and a lack of strong information analysis skills can lead Vietnamese investors to make poor stock choices. By understanding how online conversations and information processing influence investment decisions, this research can help investors avoid these pitfalls. Methodology: This study applies Structural Equation Modelling (SEM) to investigate how non-professional investors react to online information and which information factors influence their investment decisions. The final sample includes 512 investors from 18 to 65 years old from various professional backgrounds (including finance, technology, education, etc.). We conducted a combined online and offline survey using a convenience sampling method from August to November 2023. Contribution: This study contributes to the growing literature on Electronic Word-of-Mouth (EWOM) and its impact on investment decisions. While prior research has explored EWOM in various contexts, we focus on Vietnamese investors, which can offer valuable insights into its role within a developing nation’s stock market. Investors, particularly those who are new or less experienced, are often susceptible to the influence of EWOM. By examining EWOM’s influence in Vietnam, this study sheds light on a crucial factor impacting investment behavior in this emerging market. Findings: The results show that EWOM has a moderate impact on the Information Adoption and investment decisions of Vietnamese stock investors. Information Quality (QL) is the factor that has the strongest impact on Information Adoption (IA), followed by Information Credibility (IC) and Attitude Towards Information (AT). Needs for Information (NI) only have a small impact on Information Adoption (IA). Finally, Information Adoption (IA) has a limited influence on investor decisions in stock investment. We also find that investors need to verify information through official sites before making investment decisions based on posts in social media groups. Recommendations for Practitioners: The findings suggest that state management and media agencies need to coordinate to improve the quality of EWOM information to protect investors and promote the healthy development of the stock market. Social media platform managers need to moderate content, remove false information, prioritize displaying authentic information, cooperate with experts, provide complete information, and personalize the experience to enhance investor trust and positive attitude. Securities companies need to provide complete, accurate, and updated information about the market and investment products. They can enhance investor trust and positive attitude by developing news channels, interacting with investors, and providing auxiliary services. Listed companies need to take the initiative to improve the quality of information disclosure and ensure clarity, comprehensibility, and regular updates. Use diverse communication channels and improve corporate governance capacity to increase investor trust and positive attitude. Investors need to seek information from reliable sources, compare information from multiple sources, and carefully check the source and author of the information. They should improve their investment knowledge and skills, consult experts, define investment goals, and build a suitable investment portfolio. Recommendation for Researchers: This study synthesized previous research on EWOM, but there is still a gap in the field of securities because each nation has its laws, regulations, and policies. The relationships between the factors in the model are not yet clear, and there is a need to develop a model with more interactive factors. The research results need to be further verified, and more research can be conducted on the influence of investor psychology, investment experience, etc. Impact on Society: This study finds that online word-of-mouth (EWOM) can influence Vietnamese investors’ stock decisions, but information quality is more important. Policymakers should regulate EWOM accuracy, fund managers should use social media to reach investors, and investors should diversify their information sources. Future Research: This study focuses solely on the stock market, while individual investors in Vietnam may engage in various other investment forms such as gold, real estate, or cryptocurrencies. Therefore, future research could expand the scope to include other investment types to gain a more comprehensive understanding of how individual investors in Vietnam utilize electronic word-of-mouth (EWOM) and adopt information in their investment decision-making process. Furthermore, while these findings may apply to other emerging markets with similar levels of financial literacy as Vietnam, they may not fully extend to countries with higher financial literacy rates. Hence, further studies could be conducted in developed countries to examine the generalizability of these findings. Finally, future research could see how EWOM’s impact changes over a longer period. Additionally, a more nuanced understanding of the information adoption process could be achieved by developing a research model with additional factors.




format

Learning-Based Models for Building User Profiles for Personalized Information Access

Aim/Purpose: This study aims to evaluate the success of deep learning in building user profiles for personalized information access. Background: To better express document content and information during the matching phase of the information retrieval (IR) process, deep learning architectures could potentially offer a feasible and optimal alternative to user profile building for personalized information access. Methodology: This study uses deep learning-based models to deduce the domain of the document deemed implicitly relevant by a user that corresponds to their center of interest, and then used predicted domain by the best given architecture with user’s characteristics to predict other centers of interest. Contribution: This study contributes to the literature by considering the difference in vocabulary used to express document content and information needs. Users are integrated into all research phases in order to provide them with relevant information adapted to their context and their preferences meeting their precise needs. To better express document content and information during this phase, deep learning models are employed to learn complex representations of documents and queries. These models can capture hierarchical, sequential, or attention-based patterns in textual data. Findings: The results show that deep learning models were highly effective for building user profiles for personalized information access since they leveraged the power of neural networks in analyzing and understanding complex patterns in user behavior, preferences, and user interactions. Recommendations for Practitioners: Building effective user profiles for personalized information access is an ongoing process that requires a combination of technology, user engagement, and a commitment to privacy and security. Recommendation for Researchers: Researchers involved in building user profiles for personalized information access play a crucial role in advancing the field and developing more innovative deep-based networks solutions by exploring novel data sources, such as biometric data, sentiment analysis, or physiological signals, to enhance user profiles. They can investigate the integration of multimodal data for a more comprehensive understanding of user preferences. Impact on Society: The proposed models can provide companies with an alternative and sophisticated recommendation system to foster progress in building user profiles by analyzing complex user behavior, preferences, and interactions, leading to more effective and dynamic content suggestions. Future Research: The development of user profile evolution models and their integration into a personalized information search system may be confronted with other problems such as the interpretability and transparency of the learning-based models. Developing interpretable machine learning techniques and visualization tools to explain how user profiles are constructed and used for personalized information access seems necessary to us as a future extension of our work.




format

Using Social Media Applications for Accessing Health-related Information: Evidence from Jordan

Aim/Purpose: This study examined the use of Social Media Applications (SMAs) for accessing health-related information within a heterogeneous population in Jordan. The objective of this study was therefore threefold: (i) to investigate the usage of SMAs, including WhatsApp, Twitter, YouTube, Snapchat, Instagram, and Facebook, for accessing health-related information; (ii) to examine potential variations in the use of SMAs based on demographic and behavioral characteristics; and (iii) to identify the factors that can predict the use of SMAs. Background: There has been limited focus on investigating the behavior of laypeople in Jordan when it comes to seeking health information from SMAs. Methodology: A cross-sectional study was conducted among the general population in Jordan using an online questionnaire administered to 207 users. A purposive sampling technique was employed, wherein all the participants actively sought online health information. Descriptive statistics, t-tests, and regression analyses were utilized to analyze the collected data. Contribution: This study adds to the existing body of research on health information seeking from SMAs in developing countries, with a specific focus on Jordan. Moreover, laypeople, often disregarded by researchers and health information providers, are the most vulnerable individuals who warrant greater attention. Findings: The findings indicated that individuals often utilized YouTube as a platform to acquire health-related information, whereas their usage of Facebook for this purpose was less frequent. Participants rarely utilized Instagram and WhatsApp to obtain health information, while Twitter and Snapchat were very seldom used for this purpose. The variable of sex demonstrated a notable positive correlation with the utilization of YouTube and Twitter for the purpose of finding health-related information. Conversely, the variable of nationality exhibited a substantial positive correlation with the utilization of Facebook, Instagram, and Twitter. Consulting medical professionals regarding information obtained from the Internet was a strong indicator of using Instagram to search for health-related information. Recommendations for Practitioners: Based on the empirical results, this study provides feasible recommendations for the government, healthcare providers, and developers of SMAs. Recommendation for Researchers: Researchers should conduct separate investigations for each application specifically pertaining to the acquisition of health-related information. Additionally, it is advisable to investigate additional variables that may serve as predictors for the utilization of SMAs. Impact on Society: The objective of this study is to enhance the inclination of the general public in Jordan to utilize SMAs for health-related information while also maximizing the societal benefits of these applications. Future Research: Additional research is required to examine social media’s usability (regarding ease of use) and utility (comparing advantages to risks) in facilitating effective positive change and impact in healthcare.




format

Feature analytics of asthma severity levels for bioinformatics improvement using Gini importance

In the context of asthma severity prediction, this study delves into the feature importance of various symptoms and demographic attributes. Leveraging a comprehensive dataset encompassing symptom occurrences across varying severity levels, this investigation employs visualisation techniques, such as stacked bar plots, to illustrate the distribution of symptomatology within different severity categories. Additionally, correlation coefficient analysis is applied to quantify the relationships between individual attributes and severity levels. Moreover, the study harnesses the power of random forest and the Gini importance methodology, essential tools in feature importance analytics, to discern the most influential predictors in asthma severity prediction. The experimental results bring to light compelling associations between certain symptoms, notably 'runny-nose' and 'nasal-congestion', and specific severity levels, elucidating their potential significance as pivotal predictive indicators. Conversely, demographic factors, encompassing age groups and gender, exhibit comparatively weaker correlations with symptomatology. These findings underscore the pivotal role of individual symptoms in characterising asthma severity, reinforcing the potential for feature importance analysis to enhance predictive models in the realm of asthma management and bioinformatics.




format

International Journal of Bioinformatics Research and Applications




format

International Journal of Information and Operations Management Education




format

Modeling the Organizational Aspects of Learning Objects in Semantic Web Approaches to Information Systems




format

Decoupling the Information Application from the Information Creation: Video as Learning Objects in Three-Tier Architecture




format

Quality Metrics for PDA-based M-Learning Information Systems




format

Designing Online Information Aggregation and Prediction Markets for MBA Courses




format

Facilitation of Formative Assessments using Clickers in a University Physics Course




format

The Impact of Learning with Laptops in 1:1 Classes on the Development of Learning Skills and Information Literacy among Middle School Students




format

What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability?




format

ICT Use: Educational Technology and Library and Information Science Students' Perspectives – An Exploratory Studyew Article

This study seeks to explore what factors influence students’ ICT use and web technology competence. The objectives of this study are the following: (a) To what extent do certain elements of Rogers’ (2003) Diffusion of Innovations Theory (DOI) explain students’ ICT use, (b) To what extent do personality characteristics derived from the Big Five approach explain students’ ICT use, and (c) To what extent does motivation explain students’ ICT use. The research was conducted in Israel during the second semester of the academic year 2013-14, and included two groups of participants: a group of Educational Technology students (ET) and a group of Library and Information Science students (LIS). Findings add another dimension to the importance of Rogers’ DOI theory in the fields of Educational Technology and Library and Information Science. Further, findings confirm that personality characteristics as well as motivation affect ICT use. If instructors would like to enhance students’ ICT use, they should be aware of individual differences between students, and they should present to students the advantages and usefulness of ICT, thus increasing their motivation to use ICT, in the hopes that they will become innovators or early adopters.




format

Making Sense of the Information Seeking Process of Undergraduates in a Specialised University: Revelations from Dialogue Journaling on WhatsApp Messenger

Aim/Purpose: The research work investigated the information seeking process of undergraduates in a specialised university in Nigeria, in the course of a group assignment. Background: Kuhlthau’s Information Search Process (ISP) model is used as lens to reveal how students interact with information in the affective, cognitive and physical realms. Methodology: Qualitative research methods were employed. The entire seventy-seven third year students in the Department of Petroleum and Natural Gas and their course lecturer were the participants. Group assignment question was analysed using Bloom’s Taxonomy while the information seeking process of the students was garnered through dialogue journaling on WhatsApp Messenger. Contribution: The research explicates how students’ information seeking behaviour can be captured beyond the four walls of a classroom by using a Web 2.0 tool such as WhatsApp Messenger. Findings: The apparent level of uncertainty, optimism, and confusion/doubt common in the initiation, selection, and exploration phases of the ISP model and low confidence levels were not markedly evident in the students. Consequently, Kuhlthau’s ISP model could not be applied in its entirety to the study’s particular context of teaching and learning due to the nature of the assignment. Recommendations for Practitioners: The study recommends that the Academic Planning Unit (APU) should set a benchmark for all faculties and, by extension, the departments in terms of the type/scope and number of assignments per semester, including learning outcomes. Recommendation for Researchers: Where elements of a guided approach to learning are missing, Kuhlthau’s ISP may not be employed. Therefore, alternative theory, such as Theory of Change could explain the poor quality of education and the type of intervention that could enhance students’ learning. Impact on Society: The ability to use emerging technologies is a form of literacy that is required by the 21st century work place. Hence, the study demonstrates students’ adaptation to emerging technology. Future Research: The study is limited to only one case site. It would be more helpful to the Nigerian society to have this study extended to other universities for the purpose of generalisation and appropriate intervention.




format

Addressing Information Literacy and the Digital Divide in Higher Education

Aim/Purpose: The digital divide and educational inequalities remain a significant societal problem in the United States, and elsewhere, impacting low income, first-generation, and minority learners. Accordingly, institutions of higher education are challenged to meet the needs of students with varying levels of technological readiness with deficiencies in information and digital literacy shown to be a hindrance to student success. This paper documents the efforts of a mid-Atlantic minority-serving institution as it seeks to assess, and address, the digital and information literacy skills of underserved students Background: A number of years ago, a historically Black university in Maryland developed an institutional commitment to the digital and information literacy of their students. These efforts have included adoption of an international certification exam used as a placement test for incoming freshmen; creation of a Center for Student Technology Certification and Training; course redesign, pre and post testing in computer applications courses; and a student perception survey. Methodology: A multi-methodological approach was applied in this study which relied on survey results, pre and post testing of students enrolled in introductory and intermediate computer applications courses, and scores from five years of placement testing. Student pre and post test scores were compared in order to examine degree of change, and post test scores were also assessed against five years of scores from the same test used as a placement for incoming freshmen. Finally, a student perception and satisfaction survey was administered to all students enrolled in the courses under consideration. The survey included a combination of dichotomous, Likert-scaled, and ranking questions and was administered electronically. The data was subsequently exported to Microsoft Excel and SPSS where descriptive statistical analyses were conducted. Contribution: This study provides research on a population (first-generation minority college students) that is expanding in numbers in higher education and that the literature reports as being under-prepared for academic success. Unfortunately, there is a paucity of current studies examining the information and technological readiness of students specifically enrolled at minority serving institutions. As such, this paper is timely and relevant and helps to extend our discourse on the digital divide and technological readiness as it impacts higher education. The students included in this study are representative of those enrolled in Historically Black Colleges or Universities (HBCUs) in the United States, giving this paper broad implications across the country. Internationally, most countries have populations of first-generation college students from under-served populations for whom a lack of digital readiness is an also an issue therefore giving this study a global relevance. Findings: The digital divide is a serious concern for higher education, especially as schools seek to increasingly reach out to underserved populations. In particular, the results of this study show that students attending a minority serving institution do not come to college with the technology skills needed for academic success. Pre and post testing of students, as well as responses to survey questions, have proven the efficacy of computer applications courses at building the technology skills of students. These courses are viewed overwhelmingly positive by students with respondents reporting that they are a necessary part of the college experience that benefits them academically and professionally. Use of an online simulated learning and assessment system with immediate automated feedback and remediation was also found to be particularly effective at building the computer and information literacy skills of students. The total sample size for this study was over 2,800 individuals as data from 2690 IC3 tests administered over a five year period were considered, as well as 160 completed surveys, and pre and post testing of 103 students. Recommendations for Practitioners: Institutions of higher education should invest in a thorough examination of the information and technology literacy skills, needs, and perceptions of students both coming into the institution as well as following course completion. Recommendation for Researchers: This research should be expanded to more minority serving institutions across the United States as well as abroad. This particular research protocol is easily replicated and can be duplicated at both minority and majority serving institutions enabling greater comparisons across groups. Impact on Society: The results of this research help to shed light on a problem that desperately needs to be addressed by institutions of higher education, which is the realities of the digital divide and the under preparedness of entering college students in particular those who are from low income, first generation, and minority groups Future Research: A detailed quantitative survey study is being conducted that seeks to examine the technology uses, backgrounds, needs, interests, career goals, and professional expectations with respect to a range of currently relevant technologies.




format

Positive vs. Negative Framing of Scientific Information on Facebook Using Peripheral Cues: An Eye-Tracking Study of the Credibility Assessment Process

Aim/Purpose: To examine how positive/negative message framing – based on peripheral cues (regarding popularity, source, visuals, and hyperlink) – affects perceptions of credibility of scientific information posted on social networking sites (in this case, Facebook), while exploring the mechanisms of viewing the different components. Background: Credibility assessment of information is a key skill in today's information society. However, it is a demanding cognitive task, which is impossible to perform for every piece of online information. Additionally, message framing — that is, the context and approach used to construct information— may impact perceptions of credibility. In practice, people rely on various cues and cognitive heuristics to determine whether they think a piece of content is true or not. In social networking sites, content is usually enriched by additional information (e.g., popularity), which may impact the users' perceived credibility of the content. Methodology: A quantitative controlled experiment was designed (N=19 undergraduate students), collecting fine grained data with an eye tracking camera, while analyzing it using transition graphs. Contribution: The findings on the mechanisms of that process, enabled by the use of eye tracking data, point to the different roles of specific peripheral cues, when the message is overall peripherally positive or negative. It also contributes to the theoretical literature on framing effects in science communication, as it highlights the peripheral cues that make a strong frame. Findings: The positively framed status was perceived, as expected from the Elaboration Likelihood Model, more credible than the negatively framed status, demonstrating the effects of the visual framing. Differences in participants' mechanisms of assessing credibility between the two scenarios were evident in the specific ways the participants examined the various status components. Recommendations for Practitioners: As part of digital literacy education, major focus should be given to the role of peripheral cues on credibility assessment in social networking sites. Educators should emphasize the mechanisms by which these cues interact with message framing, so Internet users would be encouraged to reflect upon their own credibility assessment skills, and eventually improve them. Recommendation for Researchers: The use of eye tracking data may help in collecting and analyzing fine grained data on credibility assessment processes, and on Internet behavior at large. The data shown here may shed new light on previously studied phenomena, enabling a more nuanced understanding of them. Impact on Society: In an era when Internet users are flooded with information that can be created by virtually anyone, credibility assessment skills have become ever more important, hence the prominence of this skill. Improving citizens' assessment of information credibility — to which we believe this study contributes — results on a greater impact on society. Future Research: The role of peripheral cues and of message framing should be studied in other contexts (not just scientific news) and in other platforms. Additional peripheral cues not tested here should be also taken into consideration (e.g., connections between the information consumer and the information sharer, or the type of the leading image).




format

Practical Liability Issues of Information Technology Education: Internship and Consulting Engagements




format

Matching Office Information Systems (OIS) Curriculum To Relevant Standards: Students, School Mission, Regional Business Needs, and National Curriculum




format

Conceptions of an Information System and Their Use in Teaching about IS




format

Informing Clientele through Networked Multimedia Information Systems: Introduction to the Special Issues




format

Teaching Information Quality in Information Systems Undergraduate Education




format

Toward A Methodology For Managing Information Systems Implementation: A Social Constructivist Perspective




format

The Value of Information Systems Teaching and Research in the Knowledge Society




format

Learning from the World Wide Web: Using Organizational Profiles in Information Searches




format

Social Informatics in the Information Sciences: Current Activities and Emerging Directions




format

Representation and Organization of Information in the Web Space: From MARC to XML




format

Applications Of Informetrics To Information Retrieval Research




format

Toward a Theoretical Framework for Information Science