This paper adopts an interpretive case study approach to understand the role of digital technologies in addressing seemingly contradictory sustainability goals in mining. The sociotechnical model of information systems was used as a framework to guide the analysis of twenty-five in-depth interviews with globally dispersed digital technology experts working collaboratively at an industry-leading hi-tech mining solutions company. The sociotechnical-led thematic analysis findings highlight the trade-offs experts face in balancing narrow technological imperatives and economic outcomes with broader sustainability goals. The analysis moves beyond the technological and economic to a harmonious perspective of social, human, environmental, and technological interactions. A visual thematic map is presented to aid practitioners in designing and optimally implementing digital technologies to simultaneously address the United Nations Sustainable Development Goals while prioritising business sustainability. We conclude by drawing from the proposed sociotechnical perspectives approach for digital sustainability to provide scholars with possible pathways for future responsible information systems research.
{"title":"Sociotechnical perspectives of digital technologies in sustainable mining","authors":"Warren Gabryk, Rennie Naidoo","doi":"10.3127/ajis.v28.4369","DOIUrl":"https://doi.org/10.3127/ajis.v28.4369","url":null,"abstract":"This paper adopts an interpretive case study approach to understand the role of digital technologies in addressing seemingly contradictory sustainability goals in mining. The sociotechnical model of information systems was used as a framework to guide the analysis of twenty-five in-depth interviews with globally dispersed digital technology experts working collaboratively at an industry-leading hi-tech mining solutions company. The sociotechnical-led thematic analysis findings highlight the trade-offs experts face in balancing narrow technological imperatives and economic outcomes with broader sustainability goals. The analysis moves beyond the technological and economic to a harmonious perspective of social, human, environmental, and technological interactions. A visual thematic map is presented to aid practitioners in designing and optimally implementing digital technologies to simultaneously address the United Nations Sustainable Development Goals while prioritising business sustainability. We conclude by drawing from the proposed sociotechnical perspectives approach for digital sustainability to provide scholars with possible pathways for future responsible information systems research.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140974786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The way users perceive and use information systems artefacts has been mainly studied from the notion of behavioral beliefs, deliberate cognitive efforts, and physical actions performed by human actors to produce certain outcomes. The next generation of information systems, however, can sense, respond, and adapt to environments without necessitating similar cognitive efforts, physical contact, or explicit instructions to operate. Therefore, by leveraging theories of consciousness and technology use, this research aims to advance an alternative understanding of the "use" associated with the next generation of IS artefacts that do not require deliberate cognitive efforts, physical manipulation, or explicit instructions to yield outcomes. The theory and proposed model were refined and validated through the burst detection technique, IS expert involvement (n=10), a pilot study (n=130), and end-user surveys (n= 119). Structural equating modelling techniques were employed to test the theory. We show that unlike the manually operated IS artefacts, the “use” of a fully autonomous artefact is a conscious thought rather than a physical activity of operating a system to produce certain outcomes. We argue that, unlike the traditional notions of use associated with manually operated technologies, conscious use is not characterized solely by behavioral beliefs stemming from logical and reflective cognitive and physical efforts (e.g., effort expectancy). We propose the notion of conscious use within the context of fully autonomous entities and empirically validate its measure. Additionally, we offer recommendations for future research directions in this area. The conceptualization of this new theory for fully autonomous IS artefacts adds significant academic value to the literature given the convergence of AI-based machine learning systems and cognitive computing systems.
{"title":"“Use” as a Conscious Thought: Towards a Theory of “Use” in Autonomous Things","authors":"Gohar F. Khan, A. K. Feroz","doi":"10.3127/ajis.v28.4611","DOIUrl":"https://doi.org/10.3127/ajis.v28.4611","url":null,"abstract":"The way users perceive and use information systems artefacts has been mainly studied from the notion of behavioral beliefs, deliberate cognitive efforts, and physical actions performed by human actors to produce certain outcomes. The next generation of information systems, however, can sense, respond, and adapt to environments without necessitating similar cognitive efforts, physical contact, or explicit instructions to operate. Therefore, by leveraging theories of consciousness and technology use, this research aims to advance an alternative understanding of the \"use\" associated with the next generation of IS artefacts that do not require deliberate cognitive efforts, physical manipulation, or explicit instructions to yield outcomes. The theory and proposed model were refined and validated through the burst detection technique, IS expert involvement (n=10), a pilot study (n=130), and end-user surveys (n= 119). Structural equating modelling techniques were employed to test the theory. We show that unlike the manually operated IS artefacts, the “use” of a fully autonomous artefact is a conscious thought rather than a physical activity of operating a system to produce certain outcomes. We argue that, unlike the traditional notions of use associated with manually operated technologies, conscious use is not characterized solely by behavioral beliefs stemming from logical and reflective cognitive and physical efforts (e.g., effort expectancy). We propose the notion of conscious use within the context of fully autonomous entities and empirically validate its measure. Additionally, we offer recommendations for future research directions in this area. The conceptualization of this new theory for fully autonomous IS artefacts adds significant academic value to the literature given the convergence of AI-based machine learning systems and cognitive computing systems.\u0000 ","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140976936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automated chatbots powered by artificial intelligence (AI) can act as a ubiquitous point of contact, improving access to healthcare and empowering users to make effective decisions. However, despite the potential benefits, emerging literature suggests that apprehensions linked to the distinctive features of AI technology and the specific context of use (healthcare) could undermine consumer trust and hinder widespread adoption. Although the role of trust is considered pivotal to the acceptance of healthcare technologies, a dearth of research exists that focuses on the contextual factors that drive trust in such AI-based Chatbots for Self-Diagnosis (AICSD). Accordingly, a contextual model based on the trust-in-technology framework was developed to understand the determinants of consumers’ trust in AICSD and its behavioral consequences. It was validated using a free simulation experiment study in India (N = 202). Perceived anthropomorphism, perceived information quality, perceived explainability, disposition to trust technology, and perceived service quality influence consumers’ trust in AICSD. In turn, trust, privacy risk, health risk, and gender determine the intention to use. The research contributes by developing and validating a context-specific model for explaining trust in AICSD that could aid developers and marketers in enhancing consumers’ trust in and adoption of AICSD.
{"title":"(Why) Do We Trust AI?: A Case of AI-based Health Chatbots","authors":"A. V. Prakash, Saini Das","doi":"10.3127/ajis.v28.4235","DOIUrl":"https://doi.org/10.3127/ajis.v28.4235","url":null,"abstract":"Automated chatbots powered by artificial intelligence (AI) can act as a ubiquitous point of contact, improving access to healthcare and empowering users to make effective decisions. However, despite the potential benefits, emerging literature suggests that apprehensions linked to the distinctive features of AI technology and the specific context of use (healthcare) could undermine consumer trust and hinder widespread adoption. Although the role of trust is considered pivotal to the acceptance of healthcare technologies, a dearth of research exists that focuses on the contextual factors that drive trust in such AI-based Chatbots for Self-Diagnosis (AICSD). Accordingly, a contextual model based on the trust-in-technology framework was developed to understand the determinants of consumers’ trust in AICSD and its behavioral consequences. It was validated using a free simulation experiment study in India (N = 202). Perceived anthropomorphism, perceived information quality, perceived explainability, disposition to trust technology, and perceived service quality influence consumers’ trust in AICSD. In turn, trust, privacy risk, health risk, and gender determine the intention to use. The research contributes by developing and validating a context-specific model for explaining trust in AICSD that could aid developers and marketers in enhancing consumers’ trust in and adoption of AICSD.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140972676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingqi Li, Morteza Namvar, Ghiyoung P. Im, Saeed Akhlaghpour
The integration of machine learning (ML), functioning as the core of various artificial intelligence (AI)-enabled systems in organizations, comes with the assertion that ML models offer automated decisions or assist domain experts in refining their decision-making. The current research presents substantial evidence of ML’s positive impact on business and organizational performance. Nonetheless, there is a limited understanding of how decision-makers participate in the process of generating ML-driven insights and enhancing their comprehension of business environments through ML outcomes. To enhance this engagement and understanding, this study examines the interactive process between decision-makers and ML experts as they strive to comprehend an environment and gather business insights for decision-making. It builds upon Weick’s sensemaking model by integrating ML’s pivotal role. By conducting interviews with 31 ML experts and ML end-users, we explore the dimensions of sensemaking in the context of ML utilization for decision-making. Consequently, this study proposes a process model which advances the organizational ML research by operationalizing Weick’s work into a structured ML-driven sensemaking model. This model charts a pragmatic pathway, outlining the interaction sequence between decision-makers and ML tools as they navigate through recognizing and utilizing ML, exploring opportunities, assessing ML model outcomes, and translating ML models into action, thereby advancing both the theoretical framework and its practical deployment in organizational contexts.
机器学习(ML)是组织中各种人工智能(AI)系统的核心功能,它的整合意味着 ML 模型可提供自动决策或协助领域专家完善决策。目前的研究提供了大量证据,证明了 ML 对业务和组织绩效的积极影响。然而,对于决策者如何参与生成 ML 驱动的洞察力的过程,以及如何通过 ML 成果增强对业务环境的理解,我们的了解还很有限。为了加强这种参与和理解,本研究探讨了决策者和 ML 专家之间的互动过程,因为他们努力理解环境并为决策收集商业见解。本研究以 Weick 的 "感知决策 "模型为基础,融入了 ML 的关键作用。通过对 31 位智能语言专家和智能语言最终用户进行访谈,我们探讨了在利用智能语言进行决策的背景下感知决策的各个层面。因此,本研究提出了一个流程模型,通过将魏克的研究成果转化为结构化的、以 ML 为驱动的感性决策模型,推进了组织 ML 研究。该模型描绘了一条务实的路径,勾勒出决策者与 ML 工具之间的互动顺序,即他们在认识和利用 ML、探索机遇、评估 ML 模型成果以及将 ML 模型转化为行动的过程中的导航,从而推进了理论框架及其在组织环境中的实际应用。
{"title":"Machine Learning Based Decision-Making: A Sensemaking Perspective","authors":"Jingqi Li, Morteza Namvar, Ghiyoung P. Im, Saeed Akhlaghpour","doi":"10.3127/ajis.v28.4781","DOIUrl":"https://doi.org/10.3127/ajis.v28.4781","url":null,"abstract":"The integration of machine learning (ML), functioning as the core of various artificial intelligence (AI)-enabled systems in organizations, comes with the assertion that ML models offer automated decisions or assist domain experts in refining their decision-making. The current research presents substantial evidence of ML’s positive impact on business and organizational performance. Nonetheless, there is a limited understanding of how decision-makers participate in the process of generating ML-driven insights and enhancing their comprehension of business environments through ML outcomes. To enhance this engagement and understanding, this study examines the interactive process between decision-makers and ML experts as they strive to comprehend an environment and gather business insights for decision-making. It builds upon Weick’s sensemaking model by integrating ML’s pivotal role. By conducting interviews with 31 ML experts and ML end-users, we explore the dimensions of sensemaking in the context of ML utilization for decision-making. Consequently, this study proposes a process model which advances the organizational ML research by operationalizing Weick’s work into a structured ML-driven sensemaking model. This model charts a pragmatic pathway, outlining the interaction sequence between decision-makers and ML tools as they navigate through recognizing and utilizing ML, exploring opportunities, assessing ML model outcomes, and translating ML models into action, thereby advancing both the theoretical framework and its practical deployment in organizational contexts.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140977155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Basma M. Badreddine, Yvette Blount, Alireza Amrollahi
While cancer podcasts are valuable for support and information, there is a significant gap in understanding their quality features from users’ perspectives. Understanding quality features from users’ perspectives is important to ensure that cancer-affected people receive the support they need. This study addresses this gap by combining multiple theoretical perspectives: a. the IQ assessment framework, source credibility theory, two-factor theory of website design to assess the quality of podcasts, and b. reception theory to highlight listeners’ perception of quality. These perspectives, together, enrich the concept of information systems quality and provide a comprehensive understanding of podcasts’ quality. Through semi-structured interviews with 17 cancer-affected individuals, the research found that credibility, content, and design were essential quality features, with the visual appearance serving as a motivational factor. The integration of Reception Theory highlights users’ active role in shaping quality perceptions, offering new insights into the effective design of cancer-related podcasts. This novel approach bridges a critical research gap, illuminating the complex interplay of technical and human factors in assessing podcast quality from the perspective of users.
{"title":"Integrating Users’ Perceptions to Identify Features Indicating the Quality of Cancer-Related Podcasts Provided by Non-Profit Cancer Organisations","authors":"Basma M. Badreddine, Yvette Blount, Alireza Amrollahi","doi":"10.3127/ajis.v27i0.4435","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4435","url":null,"abstract":"While cancer podcasts are valuable for support and information, there is a significant gap in understanding their quality features from users’ perspectives. Understanding quality features from users’ perspectives is important to ensure that cancer-affected people receive the support they need. This study addresses this gap by combining multiple theoretical perspectives: a. the IQ assessment framework, source credibility theory, two-factor theory of website design to assess the quality of podcasts, and b. reception theory to highlight listeners’ perception of quality. These perspectives, together, enrich the concept of information systems quality and provide a comprehensive understanding of podcasts’ quality. Through semi-structured interviews with 17 cancer-affected individuals, the research found that credibility, content, and design were essential quality features, with the visual appearance serving as a motivational factor. The integration of Reception Theory highlights users’ active role in shaping quality perceptions, offering new insights into the effective design of cancer-related podcasts. This novel approach bridges a critical research gap, illuminating the complex interplay of technical and human factors in assessing podcast quality from the perspective of users.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139156264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A trend in information systems development is for globally distributed teams to use agile methods and frameworks such as Scrum. In globally distributed (GD) software development, a known challenge is effective team communication. Researchers, however, cannot evaluate effective communication in GD teams using Scrum unless they know what effective communication means in that context. This qualitative study contributes a theoretical model of effective communication in GD Scrum teams and practical guidance for practitioners. Ten industry professionals working in GD Scrum teams were interviewed to capture their understanding of effective communication. Qualitative content analysis was used to analyse the interviews and form a basis for the model and the practical guidance. This novel model consists of communication transparency, communication quality, and communication discipline, which together lead to the alignment of team understanding (i.e., a team-level shared mental model). This theoretical model lays the ground for future research into the effect of Scrum practices on communication in GD contexts, and the effect of communication on team and project success. For practitioners, this study contributes 11 practical actions that professionals recommend for improving and sustaining effective communication.
{"title":"Effective Communication in Globally Distributed Scrum: A Model and Practical Guidance","authors":"D. Kostin, Diane Strode","doi":"10.3127/ajis.v27i0.4501","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4501","url":null,"abstract":"A trend in information systems development is for globally distributed teams to use agile methods and frameworks such as Scrum. In globally distributed (GD) software development, a known challenge is effective team communication. Researchers, however, cannot evaluate effective communication in GD teams using Scrum unless they know what effective communication means in that context. This qualitative study contributes a theoretical model of effective communication in GD Scrum teams and practical guidance for practitioners. Ten industry professionals working in GD Scrum teams were interviewed to capture their understanding of effective communication. Qualitative content analysis was used to analyse the interviews and form a basis for the model and the practical guidance. This novel model consists of communication transparency, communication quality, and communication discipline, which together lead to the alignment of team understanding (i.e., a team-level shared mental model). This theoretical model lays the ground for future research into the effect of Scrum practices on communication in GD contexts, and the effect of communication on team and project success. For practitioners, this study contributes 11 practical actions that professionals recommend for improving and sustaining effective communication.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139156883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Paltiel, Marc Cheong, Simon Coghlan, Reeva M. Lederman
The value and importance of teaching Digital Ethics within Information Systems and ICT courses is widely recognized and stand-alone or integrated digital ethics units are broadly implemented across degree courses. However, how such courses should be taught and what content they should include is a little explored topic. Using a narrative literature review methodology, this paper reviews the pedagogical theories underpinning digital ethics courses discussed in the literature and outlines approaches that deploy standalone ethics units, integrated ethics teaching, and hybrid teaching approaches and the use of interdisciplinary models. The paper identifies the employment of, and emphasis given to various moral theories in digital ethics education. The paper then discusses how our findings relating to different pedagogical approaches, degree of integration of ethics teaching, the use of interdisciplinary models and use of moral theories—are related to each other. The discussion explores trends in approaches and models for teaching digital ethics highlighted in the review, and makes recommendations for further exploration and inquiry. It concludes that the effective teaching of digital ethics will likely involve a considered combination of approaches, models and techniques, which may also be tailored to the needs of different roles and industries.
{"title":"Approaches and Models for Teaching Digital Ethics in Information Systems Courses – A Review of the Literature","authors":"M. Paltiel, Marc Cheong, Simon Coghlan, Reeva M. Lederman","doi":"10.3127/ajis.v27i0.4517","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4517","url":null,"abstract":"The value and importance of teaching Digital Ethics within Information Systems and ICT courses is widely recognized and stand-alone or integrated digital ethics units are broadly implemented across degree courses. However, how such courses should be taught and what content they should include is a little explored topic. Using a narrative literature review methodology, this paper reviews the pedagogical theories underpinning digital ethics courses discussed in the literature and outlines approaches that deploy standalone ethics units, integrated ethics teaching, and hybrid teaching approaches and the use of interdisciplinary models. The paper identifies the employment of, and emphasis given to various moral theories in digital ethics education. The paper then discusses how our findings relating to different pedagogical approaches, degree of integration of ethics teaching, the use of interdisciplinary models and use of moral theories—are related to each other. The discussion explores trends in approaches and models for teaching digital ethics highlighted in the review, and makes recommendations for further exploration and inquiry. It concludes that the effective teaching of digital ethics will likely involve a considered combination of approaches, models and techniques, which may also be tailored to the needs of different roles and industries.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139156368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shipra Chhina, Mehmood A. Chadhar, Sally Firmin, Arthur Tatnall
An overview of challenges around blockchain adoption has revealed that there is little understanding of the process of blockchain adoption decisions, including who needs to be involved and consulted at various stages. When systems are designed to intentionally protect privacy or to obscure actors, such as blockchain platforms, it can be challenging to identify them and to understand their roles. To do this we used an Innovation Translation approach from Actor-Network Theory (Latour, 2007) which looks at the roles of both human and non-human actors. To understand the interactions among the actors involved, multiple rounds of interviews were conducted with Blockchain experts, utilising the qualitative Delphi method. The findings of this study propose a framework that provides insight into the decision-process by exploring the actors involved and their roles as they implement strategies to adopt blockchain and to convince other actors. The outcomes will assist blockchain practitioners and researchers to have an understanding of pre-adoption decisions and stakeholder involvement. Organisations considering implementing blockchain will benefit from this research as they will know where to start, who to engage, and which stakeholders are needed during the decision-making process.
{"title":"The Role of Actors in Blockchain Adoption Decisions – An Innovation Translation Perspective","authors":"Shipra Chhina, Mehmood A. Chadhar, Sally Firmin, Arthur Tatnall","doi":"10.3127/ajis.v27i0.4489","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4489","url":null,"abstract":"An overview of challenges around blockchain adoption has revealed that there is little understanding of the process of blockchain adoption decisions, including who needs to be involved and consulted at various stages. When systems are designed to intentionally protect privacy or to obscure actors, such as blockchain platforms, it can be challenging to identify them and to understand their roles. To do this we used an Innovation Translation approach from Actor-Network Theory (Latour, 2007) which looks at the roles of both human and non-human actors. To understand the interactions among the actors involved, multiple rounds of interviews were conducted with Blockchain experts, utilising the qualitative Delphi method. The findings of this study propose a framework that provides insight into the decision-process by exploring the actors involved and their roles as they implement strategies to adopt blockchain and to convince other actors. The outcomes will assist blockchain practitioners and researchers to have an understanding of pre-adoption decisions and stakeholder involvement. Organisations considering implementing blockchain will benefit from this research as they will know where to start, who to engage, and which stakeholders are needed during the decision-making process.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139156103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ly Fie Sugianto, Chuying Cheng, Carly Moulang, Brett Considine
The COVID-19 pandemic impacted workplaces, with public health orders requiring people to shift their workplaces into their homes. Consequently, many organisations pivoted to online operation and utilised technology such as Enterprise Social Media (ESM) to help manage this transition. In this study we explore leaders' diverse use of ESM during the pandemic, including whether it was used for performance management and how it shaped leaders’ social behaviour. We conducted fifteen semi-structured interviews with leaders in a large Australian University using the ESM technology. Our results explore the nuances of ESM use during this time including how it was used as a social tool, a communication tool, and as an informal means to collect performance data. Interviews also revealed concerns with ESM use such as privacy and information redundancy. Our work advances the Task-Technology Fit (TTF) literature by conceptualising cognitive and affective mechanisms to understand how utilisation moderates TTF outcomes. These mechanisms are contingent on how leaders use ESM and the level of their interactions and engagements. We identify practical implications of ESM use at a time of crisis including leader training, clear guidelines for internal communication, efficient information sharing practices, and informed consent for ESM-related data collection practices.
{"title":"The Role of Enterprise Social Media during the COVID-19 Pandemic: Insights from Leaders' Experience","authors":"Ly Fie Sugianto, Chuying Cheng, Carly Moulang, Brett Considine","doi":"10.3127/ajis.v27i0.4331","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4331","url":null,"abstract":"The COVID-19 pandemic impacted workplaces, with public health orders requiring people to shift their workplaces into their homes. Consequently, many organisations pivoted to online operation and utilised technology such as Enterprise Social Media (ESM) to help manage this transition. In this study we explore leaders' diverse use of ESM during the pandemic, including whether it was used for performance management and how it shaped leaders’ social behaviour. We conducted fifteen semi-structured interviews with leaders in a large Australian University using the ESM technology. Our results explore the nuances of ESM use during this time including how it was used as a social tool, a communication tool, and as an informal means to collect performance data. Interviews also revealed concerns with ESM use such as privacy and information redundancy. Our work advances the Task-Technology Fit (TTF) literature by conceptualising cognitive and affective mechanisms to understand how utilisation moderates TTF outcomes. These mechanisms are contingent on how leaders use ESM and the level of their interactions and engagements. We identify practical implications of ESM use at a time of crisis including leader training, clear guidelines for internal communication, efficient information sharing practices, and informed consent for ESM-related data collection practices.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With increasing mobile work due to the COVID-19 pandemic, the usage and relevance of consumer IT for business purposes have substantially increased. In this light, an understudied area of IT consumerization, the adverse outcomes for employees using consumer IT for business purposes, is of major importance. We conduct a mixed-methods study to investigate the adverse outcomes of IT consumerization. We build on prior studies and end-user interviews to draw connections between IT consumerization and unreliability as one known technostressor. A quantitative survey of 162 full-time employees shows that IT consumerization is associated with increased unreliability. The users’ general computer self-efficacy, instead, decreases unreliability, and unreliability leads to various job-related and health-related outcomes. We show that unreliability is driven by users’ experience while trying to integrate private and business IT components for business purposes. We follow up on this observation through a qualitative analysis of open-ended survey questions to detail users’ experiences. Our findings emphasize the need to examine the negative outcomes of IT consumerization, despite its well-studied positive effects. We suggest that organizations should strive to integrate business and private IT as much as IT security constraints allow for reduced technostress.
{"title":"Issues regarding IT Consumerization: How Mixed IT Portfolios of Private and Business IT Components Cause Unreliability","authors":"Julia Lanzl, Manfred Schoch, Henner Gimpel","doi":"10.3127/ajis.v27i0.4121","DOIUrl":"https://doi.org/10.3127/ajis.v27i0.4121","url":null,"abstract":"With increasing mobile work due to the COVID-19 pandemic, the usage and relevance of consumer IT for business purposes have substantially increased. In this light, an understudied area of IT consumerization, the adverse outcomes for employees using consumer IT for business purposes, is of major importance. We conduct a mixed-methods study to investigate the adverse outcomes of IT consumerization. We build on prior studies and end-user interviews to draw connections between IT consumerization and unreliability as one known technostressor. A quantitative survey of 162 full-time employees shows that IT consumerization is associated with increased unreliability. The users’ general computer self-efficacy, instead, decreases unreliability, and unreliability leads to various job-related and health-related outcomes. We show that unreliability is driven by users’ experience while trying to integrate private and business IT components for business purposes. We follow up on this observation through a qualitative analysis of open-ended survey questions to detail users’ experiences. Our findings emphasize the need to examine the negative outcomes of IT consumerization, despite its well-studied positive effects. We suggest that organizations should strive to integrate business and private IT as much as IT security constraints allow for reduced technostress.","PeriodicalId":45261,"journal":{"name":"Australasian Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}