AJIS Volume 28: Four new articles published in the Australasian Journal of Information Systems

Published by Karlheinz Kautz on

Dear Colleagues,

The Australasian Journal of Information Systems (AJIS) has just published 4 new articles in its Volume 28 Research Article section:

What prevents organisations from achieving e-HRM potential?

Arnela Ceric, Kevin Parton
aceric@csu.edu.au
doi: https://doi.org/10.3127/ajis.v28.3877

Use of electronic human resource management (e-HRM) offers the prospect of enabling the human resource management (HRM) function to take on a strategic partner’s role in organisations. Despite the pervasive expansion of e-HRM use, there is no clear understanding of why organisations are not achieving e-HRM potential. We address this issue by investigating e-HRM adoption factors and their influence on information technology (IT) use potential to automate, informate and transform the HRM function in a sequential manner. In particular, we examine HRM professionals’ experiences with e-HRM use, including challenges, successes, and outcomes. We identified e-HRM adoption factors that enable and that constrain each stage of e-HRM use. With a focus on the inhibiting factors, our findings suggest that e-HRM potential hindered already in the automation stage diminishes e-HRM potential to subsequently informate and to transform the e-HRM function.

#humanresourcemanagement #informationsystems #eHRMadoption #eHRMchallenges #strategiceHRMoutcomes

Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework

Jia Xu, Humza Naseer, Sean Maynard, Justin Filippou
jx3@student.unimelb.edu.au
doi: https://doi.org/10.3127/ajis.v28.4215

Organisations are increasingly practising business analytics to generate actionable insights that can guide their digital business transformation. Transforming business digitally using business analytics is an ongoing process that requires an integrated and disciplined approach to leveraging analytics and promoting collaboration. An emerging business analytics practice, Data Operations (DataOps), provides a disciplined approach for organisations to collaborate using analytical information for digital business transformation. We propose a conceptual framework by reviewing the literature on business analytics, DataOps and organisational information processing theory (OIPT). This conceptual framework explains how organisations can employ DataOps as an integrated and disciplined approach for developing the analytical information processing capability and facilitating boundary-spanning activities required for digital business transformation. This research (a) extends current knowledge on digital transformation by linking it with business analytics from the perspective of OIPT and boundary-spanning activities, and (b) presents DataOps as a novel approach for using analytical information for digital business transformation.

#Digitalbusinesstransformation #Businessanalytics #Analyticalinformationprocessingcapability #Boundaryspanning #DataOps

Mobile Identity Protection: The Moderation Role of Self-Efficacy

Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliviera
yalhelaly@novaims.unl.pt
doi: https://doi.org/10.3127/ajis.v28.4397

The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting identity in a mobile environment is a problem. This study develops a model that examines the role of identity protection self-efficacy in increasing users’ motivation intentions to achieve actual mobile identity protection. Our research found that self-efficacy significantly affects the relationship between users’ perceived threat appraisal and their motivational intentions for identity protection. The relation between mobile users’ protection, motivational intentions, and actual mobile identity protection actions was also found to be significant. Additionally, the findings revealed the considerable impact of awareness in fully mediating between self-efficacy and actual identity protection. The model and its hypotheses are empirically tested through a survey of 383 mobile users, and the findings are validated through a panel of experts, thus confirming the impact of self-efficacy on an individual’s identity protection in the mobile context.

#Mobileidentityprotection#identitytheft#selfefficacy#threatappraisal#identityprotectionawareness#mobilecontext#motivation

Doing Big Things in a Small Way: A Social Media Analytics Approach to Information Diffusion During Crisis Events in Digital Influencer Networks

Shohil Kishore, Amy Errmann
s.kishore@auckland.ac.nz
doi: https://doi.org/10.3127/ajis.v28.4429

Digital influencers play an essential role in determining information diffusion during crisis events. This paper demonstrates that information diffusion (retweets) on the social media platform Twitter (now X) highly depends on digital influencers’ number of followers and influencers’ location within communication networks. We show (study 1) that there is significantly more information diffusion in regional (vs. national or international) crisis events when tweeted by micro-influencers (vs. meso- and macro-influencers). Further, study 2 demonstrates that this pattern holds when micro-influencers operate in a local location (are located local to the crisis). However, effects become attenuated when micro-influencers are situated in a global location (outside of the locality of the event). We term this effect ‘influencer network compression’ – the smaller in scope a crisis event geography (regional, national, or international) and influencer location (local or global) becomes, the more effective micro-influencers are at diffusing information. This shows that those who possess the most followers (meso- and macro-influencers) are less effective at attracting retweets than micro-influencers situated local to a crisis. As online information diffusion plays a critical role during public crisis events, this paper contributes to both practice and theory by exploring the role of digital influencers and their network geographies in different types of crisis events.

#informationdiffusion #publiccrisisevents #digitalinfluencersinfluencernetworkcompression #computationallyintensivemethods

Thank you for your continuing interest in our work.

Regards

Professor Karlheinz Kautz
Editor-in-Chief, Australasian Journal of Information Systems
http://journal.acs.org.au/index.php/ajis/

Categories: AJIS