


default search action
ACIS 2016: Wollongong, NSW, Australia
- Australasian Conference on Information Systems, ACIS 2016, Wollongong, NSW, Australia, December 5-7, 2016. 2016
- Stefan Gruner:
Heinz Zemanek's Almost Forgotten Contributions to the Early Philosophy of Informatics. 1 - Niklas Eriksson, Mikael Forsström, Carl-Johan Rosenbröijer:
The Data Driven Decision RACE in eRetailing. 2 - Corina Raduescu, Jenny Leonard, Catherine Hardy:
Course Design Principles to Support the Learning of Complex Information Infrastructures. 3 - Xinxing Zhang, James R. Warren, Yulong Gu:
The Use of Chinese-language Internet Information about Cancer by Chinese Health Consumers. 4 - Mahdi Fahmideh Gholami, Farhad Daneshgar, Fethi Rabhi:
Cloud Computing Adoption: An Effective Tailoring Approach. 5 - Kai Riemer, Robert Bruce Johnston:
Making Sense of Disruption: A Kuhnian Analysis. 6 - Stefan Cronholm, Hannes Göbel:
ITIL compliance with a Service Perspective: a Review Based on Service-Dominant Logic. 7 - Daniel Alejandro Arregui, Sean B. Maynard, Atif Ahmad:
Mitigating BYOD Information Security Risks. 8 - Peter W. Eklund, Edward Dou, Ulrike Gretzel:
Location privacy acceptance: attitudes to transport-based location-aware mobile applications on a university campus. 9 - Igor T. Hawryszkiewycz:
Design in Complex Environments. 10 - Stefan Cronholm, Hannes Göbel, Anders Hjalmarsson:
Empirical Evaluation of Action Design Research. 11 - Dale MacKrell, Craig McDonald, Fiona Buick, Dale Kleeman:
Boundary Spanning Theory: a Case Study of the Professionalisation of ICT Graduates in the Australian Public Service. 12 - Bruce Hilliard, Jocelyn Armarego, Tanya McGill:
Optimising Visual Layout for Training and Learning Technologies. 13 - Sophie Cockcroft:
Big data in Financial Management a structured literature review and Opportunities for IS research. 14 - Naffisah Mohd Hassan, Khin Than Win, Harri Oinas-Kukkonen:
Online patient education design features: are there any differences in opinion based on consumer's stage of change? 15 - Hannes Göbel, Stefan Cronholm, Anders Hjalmarsson:
Inscribing Service into IT Service Management. 16 - Allen Higgins, Babak Saadatmandi:
Country Selection and Impact IT Sourcing: Relationships Between Business Factors and Social Inequality. 17 - Lucas Mimbi, Felix Olu Bankole:
ICT and Public Service Value Creation in Africa: Efficiency Assessment Using DEA approach. 18 - Hiep Cong Pham, Linda Brennan, Joan Richardson:
Stress-Based IS Security Compliance: Towards a Conceptual Model. 19 - Monika Magnusson:
Facebook Usage During a Flood - a Content Analysis of Two Local Governments' Facebook Pages. 20 - Koen Smit, Martijn Zoet, Raymond Slot:
Compliance Principles for Decision Management Solutions at the Dutch Government. 21 - Ross Farrelly, Eng Chew:
Who's in to Win?: Participation Rate in a Primary Personal Information Market. 22 - Mary Tate, Rory Sudfeld, Jennifer Campbell-Meier, Mark McGuire:
A Case Study of Stakeholder Perspectives on a Flipped Classroom Initiative Using an Organizational Routines Lens. 23 - Wanxian Zeng, Alex Richardson:
Adding Dimension to Content: Immersive Virtual Reality for e-Commerce. 24 - Wanxian Zeng, Alex Richardson:
Lost in Translation: The Influence of Translated Information Quality on Foreign Shoppers. 25 - Ahmed AlKalbani, Hepu Deng, Booi Kam, Julia Zhang:
Investigating the Impact of Institutional Pressures on Information Security Compliance in Organizations. 26 - Renee Rui Chen, Robert M. Davison, Carol Xiaojuan Ou:
Using Social Media for Business Communication: A Symbolic Interaction Perspective. 27 - Dedi Iskandar Inan, Ghassan Beydoun, Simon Opper:
Customising Agent Based Analysis Towards Analysis of Disaster Management Knowledge. 28 - Richard Rannard, Lesley Land, Ken Stevens:
Attributes, Processes, and Tendencies applied to Government Information Technology Outsourcing. 29 - Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach. 30 - Arif Ali, Pak Yoong, Allan Sylvester:
Barriers Inhibiting the Development of a Self-Sustaining Virtual Learning Cluster of Schools in New Zealand: The Case of the C-Net Cluster. 31 - Meng Xiao, Caddie Gao, Rob Meredith:
An Investigation of How and Why Managers Use Tablets to Support Decision Making. 32 - Elina Niemimaa:
Legitimising Information Security Policy during Policy Crafting: Exploring Legitimising Strategies. 33 - Oliver Degner, Andreas Drechsler:
Towards a Model for Discourse Ethics-based Digital Business Strategy Development. 34 - Sanjay Mathrani:
Managing Distribution Logistics Using Enterprise Systems. 35 - Md. Zakir Hossain, Tom Gedeon, Ramesh S. Sankaranarayana:
Observer's Galvanic Skin Response for Discriminating Real from Fake Smiles. 36 - Manuel Holler, Falk Uebernickel, Walter Brenner:
Challenges in Product Lifecycle Management - Evidence from the Automotive Supply Industry. 37 - Abhinay Puvvala, Veerendra Kumar Rai, Rutuja Patil:
Governance Policies in IT Service Support. 38 - Mohammad Fakhrul Alam Onik, Erwin Fielt:
Understanding the dynamics of Bvit Process: a Complex adaptive Systems Approach. 39 - Joanne F. Patroni, Frederik von Briel, Jan Recker:
Do retailers leverage consumer social media content for innovation? An exploratory study. 40 - Kevin Shedlock, Marta Vos, Sue Chard:
Design Science Research: Building evaluation into the construction of indigenous cultural artefacts in New Zealand. 41 - Yi-Mei Huang, David Pauleen, Shane Scahill, Nazim Taskin:
The influence of personal knowledge management on individual decision making in health care medical treatment. 42 - Shah Jahan Miah, John G. Gammack, Najmul Hasan, Md. Rakibul Hoque:
Design methodologies for M-health innovations: a content analysis. 43 - Mohammad Mehdi Rajaeian, Aileen Cater-Steel, Michael Lane:
Do they read your research? An investigation of practitioners' use of IT outsourcing and cloud sourcing research. 44 - Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage:
A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective. 45 - Robert W. Smyth, Guy Gable, Graham Pervan:
A SWOT Analysis of the IS Academic Discipline in Australia. 46 - Kathryn Parsons, Dragana Calic, Carlos Barca:
Self-Disclosure on Facebook: Comparing two Research Organisations. 47 - Paul Jackson, Philip Dobson, Denise Gengatharen:
Focusing on non-adopters of broadband: A critical realist perspective. 48 - Mike Seymour, Ella Hafermalz:
Hello Computer: Towards a Research Agenda for Conceptualising "Presence" in Human-Computer Engagement. 49 - Brian Cusack, Eghbal Ghazizadeh:
Analysing Trust Issues in Cloud Identity Environments. 50 - John Janosko, Tingru Cui, Sim Kim Lau:
A Conceptual Model for the Application of Business Analytics in the Horizontal Strategic Alliance. 51 - Riza Azmi, William Tibben, Khin Than Win:
Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy. 52 - Oliver K. Burmeister, David Ritchie, Alison Devitt, Eevon Chia, Gregory Dresser:
Evaluation of Telehealth Equipment. 53 - Daisy Seng, Ly Fie Sugianto, Carla Wilkin:
Measuring Mobile Portal User Satisfaction. 54 - Mali Senapathi:
Understanding the Curriculum Gap in Systems Analysis and Design: An Exploratory Study. 55 - Agata McCormac, Dragana Calic, Kathryn Parsons, Tara Zwaans, Marcus A. Butavicius, Malcolm Robert Pattinson:
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q). 56 - Badrunnesa Zaman, Erwin Fielt:
Understanding Information System Innovation: Moving beyond adoption and diffusion. 57 - Janak Adhikari, Anuradha Mathrani, David Parsons, Chris Scogings:
Understanding Learning Outcome Divide in the Learning Process from a Teachers Perspective: A BYOD Case Study. 58 - Giang Hoang, Alemayehu Molla, Pak-Lok Poon:
How do environmental enterprise systems contribute to sustainability value? A practitioner-oriented framework. 59 - Nwakego Ugochi Isika, Antonette Mendoza, Rachelle Bosua:
The use of social media by adults with chronic illness: analysing the support mechanisms of four social media platforms. 60 - Humza Naseer, Graeme G. Shanks, Atif Ahmad, Sean B. Maynard:
Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective. 61 - Matt Halliwell, Mark Bruce Freeman, Khin Than Win:
Understanding Learning Outcomes through Member Needs, Motivation and Satisfaction: the Development of a Conceptual Model. 62 - Marie D. Fernando, Athula Ginige, Ana Hol:
Structural and Behavioural Model for Social Computing Applications. 63 - Catherine Olivia McRae, Jean-Grégoire Bernard, Jocelyn Cranefield:
Understanding the Internet Pitchfork Mob: Internal Revolutionary Activity in Self-Regulated Online Communities. 64 - Anna Zaitsev, Kenneth Stevens:
The Multidimensionality of IT Outsourcing Risks. 65 - Adedapo Oluwaseyi Ojo, Murali Raman:
Modelling the underlying behavioural antecedents of the digital divide from the ability, motivation and opportunity framework. 66 - Chris Niyi Arasanmi:
The link between post-implementation learning motivation and enterprise resource planning system usage: a pilot study. 67 - Timm Teubner, Norman Saade, Florian Hawlitschek, Christof Weinhardt:
It's only pixels, badges, and stars: On the economic value of reputation on Airbnb. 68 - Brian Cusack, Raymond Lutui, Reza Khaleghparast:
Detecting Slow DDos Attacks on Mobile Devices. 69 - João Barata, Sharon Coyle:
Socially-Constructed Metrics for Agile Quality: An Action Research Study. 70 - Kenan Degirmenci:
Trust-Promoting Seals in Green Information Systems: The Case of Smart Meters and Privacy. 71 - Marjan Aslanzadeh, Byron W. Keating:
Effective Use of Self-service Technology by Physically Disabled Individuals. 72 - Tian Yu Goh, Frada Burstein, Pari Delir Haghighi, Rachelle Buchbinder, Margaret Staples:
Integrating contextual and online self-reported data for personalized healthcare: a tennis elbow case study. 73 - Osemwonyemwen Oshodin, Alemayehu Molla, Chin Eang Ong:
An Information Systems Perspective on Digital Currencies: A Systematic Literature Review. 74 - Gary Sterrenberg, Byron W. Keating:
Measuring IS success of e-government: A case study of the disability sector in Australia. 75 - Erin Roehrer, Leonie Ellis, Dean Steer:
Innovation and flexibility within a Bachelor of Information Systems transnational educational (TNE) program. 76 - Steve Elliot, Ella Hafermalz, Dirk Hovorka, Sebastian K. Boell, Kai Riemer, Olivera Marjanovic:
The Sharing Economy and the Transformative Roles of IS: An Australian Study. 77 - K. Niki Kunene, Kamila Zysk:
Healthcare Consumers' Voluntary Adoption and Non-Adoption of Electronic Personal Health Records. 78 - Carlos Andres Agudelo, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach. 79 - Mehdi Hussain, Ahmed Imran:
A M-Service Implementation in Large Government Organisation: A Case Study on an M-app in Australia. 80 - Bashir Hussain, Ahmed Imran, Tim Turner:
Key Challenges for Establishing CIO Position in the Public Sector of LDCs: A Case of Bangladesh. 81 - Sojen Pradhan:
Infusion of social innovation in outsourcing for developing countries: A case in Nepal. 82 - Annette Mills, Nelly Todorova:
An Integrated Perspective on Factors Influencing Online Health-Information Seeking Behaviours. 83 - Abdulaziz Murad, Reeva Lederman, Rachelle Bosua, Shanton Chang, John D. Wark:
Design Considerations for a Virtual Community of Practice for Health Practitioners: A Learner Centred Design Approach. 84 - Haiyun Zou, Israr Qureshi, Yulin Fang, Heshan Sun, Kai Lim, Elaine Ramsey, Patrick McCole:
Investigating the Nonlinear and Conditional Effects of Trust on Effective Customer Retention -The Role of Institutional Contexts. 85 - William Tibben, Shanmuga Sundram:
Assessing student engagement in cross campus work in learning: a teaching case in corporate network management. 86 - Craig A. Horne, Atif Ahmad, Sean B. Maynard:
A Theory on Information Security. 87 - Ashay Saxena, Shankar Venkatagiri, Rajendra K. Bandi:
Managing Inherent Conflicts in Agile Distributed Development: Evidence from Product Development. 88 - Peter Wynne:
Developing Acquisition IS Integration Capabilities: The Learning Processes of Novice Acquirers. 89 - Sedigheh Khademi, Pari Delir Haghighi, Frada Burstein, Christopher Palmer:
Enhancing rule-based text classification of neurosurgical notes using filtered feature weight vectors. 90 - Henrik C. J. Linderoth, Anders Isaksson:
The Role of Experience of Practice for Perceptions of a new Technology - The Case of Building Information Modelling. 91

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.