Submissions from 2015
Opportunities and challenges of mobile learning for promoting mathematical literacy, Zaenal Abidin, Anuradha Mathrani, David Parsons, and Suriadi Suriadi
Quantitative Analysis of Desirability in User Experience, Sisira Adikari, Craig McDonald, and John Campbell
Conceptual Knowledge Relationship Model of Enterprise Architecture and Top Management Roles, Hawa Ahmad, Aishah Ahmad, and Nik Hazliana Nik Abdullah Hafaz
Improving pathology reports using business intelligence techniques: An experimental study, Yasmine Alahmdai and Peter O’Donnell
The Effect of ICT Self-Discipline in the Workplace, Balsam Al-Dabbagh, Eusebio Scornavacca, Allan Sylvester, and David Johnstone
The Influence of Trust and subjective Norms on Citizens’ Intentions to Engage in E-participation on E-government Websites, Abdullah Alharbi, Kyeong Kang, and Prof. Igor Hawryszkiewycz
A Multi Perspective Approach for Understanding the Determinants of Cloud Computing Adoption among Australian SMEs, Salim Alismaili, Mengxiang Li, Jun Shen, and Qiang He
Investigating the Role of Socio-organizational Factors in the Information Security Compliance in Organizations, Ahmed AlKalbani, Hepu Deng, and Booi Kam
Analysis of Research in Healthcare Data Analytics, Mohammad Ahmad Alkhatib, Amir Talaei-Khoei, and Amir Hossein Ghapanchi
The Potential Impact of Digital Currencies on the Australian Economy, Mustafa Ally, Michael Gardiner, and Michael Lane
A Conceptual Framework for Accountability in Cloud Computing Service Provision, Zahir Al-Rashdi, Martin Dick, and Ian Storey
Information Security Policy: A Management Practice Perspective, Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, and Shanton Chang
A Process Model for Crowdsourcing: Insights from the Literature on Implementation, Alireza Amrollahi
Supporting ‘Good Habits’ through User-Led Design of Food Safety Applications – Findings from a Survey of Red Meat Consumers, Adeola Bamgboje-Ayodele, Leonie Ellis, and Paul Turner
Interdisciplinary Translation of Comparative Visualization, James Birt, Dirk S. Hovorka, and Jonathan Nelson
Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework, Deborah Bunker, Catherine Hardy, Abdul Babar, and Kenneth J Stevens
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails, Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac
Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study, Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo
Ethical Implications of IT-enabled Information Flows Conceived as Intermediaries or Mediators, Dubravka Cecez-Kecmanovic and Olivera Marjanovic
A Framework for Techniques for Information Technology Enabled Innovation, Yajur Chadha, Aditi Mehra, Shirley Gregor, and Alex Richardson
The Development Strategy of IT Capability: A Contingency Perspective, Po-Yen Chen and Chorng-Shyong Ong
Using Design Science to Build a Watermark System for Cloud Rightful Ownership Protection, Brian Cusack and Reza Khaleghparast
Implications of Managing Health related Records and Relevant Information Systems within Intergovernmental Agencies, Adam Davies, Roberto Bergami, and Shah Jahan Miah
Strategy in a Digital World, Melinda D’Cruz, Greg Timbrell, and Jason Watson
Disruptive Transformation of Enterprise Supply Chain Performance: Strategic Business Networks to Improve Business Value, Steve Elliot, Martin McCann, and Kory Manley
COMBINING THE FOGG BEHAVIOURAL MODEL AND HOOK MODEL TO DESIGN FEATURES IN A PERSUASIVE APP TO IMPROVE STUDY HABITS, Justin Filippou, Christopher Cheong, and France Cheong
Assessment Issues in Mathematics: Design Science Approach for developing an Expert-System Based Solution, Hussein Genemo and Shah Jahan Miah
Business Process Management: Saving the Planet?, Shahrzad Roohy Gohar and Marta Indulska
Visualizing the invisible – the relentless pursuit of MTech Imaging, Jenson Chong-Leng Goh, Jeffery Beng-Huat Tan, and Janice Sio-Nee Tan
Evaluating the Business Value of CPOE for Cancer Care in Australia: A Resource Based View Perspective, Peter Haddad, Jonathan L. Schaffer, and Nilmini Wickramasinghe
Shared Secret Places: Social Media and Affordances, Ella Hafermalz, Dirk S. Hovorka, and Kai Riemer
Participating or Not Participating? A Sociomaterial Perspective of the Embeddedness of Online Communities in Everyday Life, Geri Harris and Babak Abedin
Why customers participate in social commerce activities? – A laddering analysis, Syahida Hassan, Janet Toland, and Mary Tate
ICT’s Effect on Parents’ Feelings of Presence, Awareness, and Connectedness during a Child’s Hospitalization, Abbas Heidari, Yahya Kazemzadeh, and Greg Wadley
ARCHITECTING END-TO-END INFORMATION SERVICES FOR CONTINUOUS STUDENT BEHAVIOUR MANAGEMENT, Wayne Hellmuth and Glenn Stewart
Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective, Alireza Heravi, Sameera Mubarak, and Kim-Kwang Raymond Choo
Information Security Strategy in Organisations: Review, Discussion and Future Research Directions, Craig A. Horne, Atif Ahmad, and Sean B. Maynard
Open data adoption in Australian government agencies: an exploratory study, Mohammad Alamgir Hossain and Caroline Chan
Towards knowledge sharing in disaster management: An agent oriented knowledge analysis framework, Dedi Iskandar Inan, Ghassan Beydoun, and Simon Opper
A Theoretical Approach to initiate Mobile Assisted Language Learning among school leavers and University Students of Sri Lanka, Fazeena Jamaldeen, Yamaya Ekanayaka, and Kamalanath Hewagamage
SOA Governance – Road into Maturity, George Joukhadar and Fethi Rabhi
Intelligent audit code generation from free text in the context of neurosurgery, Sedigheh Khademi, Pari Delir Haghighi, Philip Lewis, Frada Burstein, and Christopher Palmer
A DSS framework for maintaining relevant features of Small Business B2C Websites, Madhury Khatun and Shah Jahan Miah
How Fluffy is the Cloud?: Cloud Intelligence for a Not-for-profit Organisation, Purva Koparkar and Dale MacKrell
Open Food Network: the Role of ICT to Support Regional Food Supply Chains in Australia, Sherah Kurnia, Serenity Hill, Md Mahbubur Rahim, Kirsten Larsen, Patrice Braun, and Danny Samson
Using Collaborative Visual Analytics for Innovative Industry-inspired Learning Activities, Olivera Marjanovic
An Analysis of Personal Information Privacy Concerns using Q-Methodology, Gregg Martin, Hritik Gupta, Stephen C. Wingreen, and Annette M. Mills
Knowledge Retention through Low-Tech Knowledge Sharing Channels in Loosely-Coupled Networks: A Human-Based Approach, Rosemary Van Der Meer and Karlheinz Kautz
The Use of ICT to preserve Australian Indigenous Culture and Language – a Preliminarily Proposal Using the Activity Theory Framework, Sarah Van Der Meer, Stephen Smith, and Vincent Pang
ICT and Health System Performance in Africa: A Multi-Method Approach, Lucas Mimbi and Felix Olu Bankole
IT Managers' Perception and Response to Digital Disruption: An Exploratory Study, Alemayehu Molla, Vanessa Cooper, and Vass Karpathiou
A Crowd Monitoring Framework using Emotion Analysis of Social Media for Emergency Management in Mass Gatherings, Minh Quan Ngo, Pari Delir Haghighi, and Frada Burstein
Leveraging ERP Implementation to Create Intellectual Capital: the Role of Organizational Learning Capability, Quang V. Nguyen, Mary Tate, Philip Calvert, and Benoit Aubert
Examining the social aspects of Enterprise Architecture Implementation: A Morphogenetic Approach, Edi Nuryatno and Philip Dobson
Antecedents for Successful Collaboration in Requirements Engineering, Risto Paavola and Petri Hallikainen
Implications of Environmental Uncertainty for Business-IT Alignment: A Comparative Study of SMEs and Large Organizations, Amitha Padukkage, Val Hooper, and Janet Toland
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, Agata McCormac, Dragana Calic, and Cate Jerram
A Comparative Analysis of MOOC - Australia’s Position in the International Education Market, Georg Peters, Doreen Sacker, and Jan Seruga
Barriers to the Integration of Information Technology within Early Childhood Education and Care Organisations: A Review of the Literature, Melinda Plumb and Karlheinz Kautz
Developing a Methodology for Online Service Failure Prevention: Reporting on an Action Design Research Project-in-Progress, Jacques Louis Du Preez, Mary Tate, and Alireza Nili
High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic, Gerhard Rauchecker and Guido Schryen
Exploring the roles of ICT in supporting sustainability practices, Abdon Carrera Rivera and Sherah Kurnia
Fears and Triggers: A Conceptual Study of Vendor-Supplied Maintenance and Maintenance Deferral of Standard Package Software, Christopher Savage, Karlheinz Kautz, and Rodney Clarke
Investigating the Impact of Learners’ Learning Styles on the Acceptance of Open Learner Models for Information Sharing, YongWee Sek, Hepu Deng, Elspeth McKay, and Minghui Qian
Virtualization Technology: Cross-VM Cache Side Channel Attacks make it Vulnerable, Abid Shahzad and Alan Litchfield
Multi-synchronous collaboration between desktop and mobile users: A case study of report writing for emergency management, Adrian Shatte, Jason Holdsworth, and Ickjai Lee
Virtualising Process Assessments to Facilitate Continual Service Improvement in IT Service Management, Anup Shresth, Aileen Cater-Steel, and Mark Toleman
A Conceptual Framework to Assess the Effectiveness of Rubric Tool, Phil Smith, Blooma John, and Jayan Kurian
Individual Level Culture Effects on Multi-Perspective iTrust in B2C E-commerce, Osama Sohaib and Kyeong Kang
Applying Adapted Big Five Teamwork Theory to Agile Software Development, Diane Strode
Defining and Conceptualizing Actionable Insight: A Conceptual Framework for Decision-centric Analytics, Shiang-Yen Tan and Taizan Chan
How to be a Good ‘Frand’ in China: an Exploratory Study of Effective Social Media Behaviours for Foreign Brands, Mary Tate, Hongzhi Gao, Hongxia Zhang, and David Johnstone
The Lived User Experience of Virtual Environments: Initial Steps of a Phenomenological Analysis in a Safety Training Setting, Marko Teräs, Hanna Teräs, and Torsten Reiners
Does Broadband Connectivity and Social networking sites build and maintain social capital in rural communities?, Sanjib Tiwari, Michael Lane, and Khorshed Alam
The challenges and opportunities of delivering wireless high speed broadband services in Rural and Remote Australia: A Case Study of Western Downs Region (WDR), Sanjib Tiwari, Michael Lane, and Khorshed Alam
Behavioural Dimensions for Discovering Knowledge Actor Roles Utilising Enterprise Social Network Metrics, Janine Viol, Rebecca Bernsmann, and Kai Riemer
Maturity of the Internet of Things Research Field: Or Why Choose Rigorous Keywords, Marta Vos
Exploring the Use of Enterprise 2.0 and Its Impact on Social Capital within a Large Organisation, Diana Wong, Rachelle Bosua, Sherah Kurnia, and Shanton Chang
Internal Versus External Recruitment – The Story of Three Consecutive Project Managers in an IT Project, Michelle Ye, Kristy de Salas, and Nadia Ollington
An SME's Adoption of a Cloud Based Integrated Management System (IMS) When Certifying against Management System Standards (MSS), Ming Hock Yew and Jenson Chong-Leng Goh
Green Information Technology as Administrative innovation - Organizational factors for successful implementation: Literature Review, Badrunnesa Zaman and Darshana Sedera
The Role of Translated Information Quality in a Global e-Retailing Context, Wanxian Zeng and Alex Richardson
Investigating the Impacts of Recommendation Agents on Impulsive Purchase Behaviour, Hui Zhu, Zherui Yang, Carol XJ Ou, Hongwei Liu, and Robert M. Davison
Evaluating the Utility of Research Articles for Teaching Information Security Management, Harry Zurita, Sean B. Maynard, and Atif Ahmad