Follow

Submissions from 2015

PDF

Opportunities and challenges of mobile learning for promoting mathematical literacy, Zaenal Abidin, Anuradha Mathrani, David Parsons, and Suriadi Suriadi

PDF

Quantitative Analysis of Desirability in User Experience, Sisira Adikari, Craig McDonald, and John Campbell

PDF

Conceptual Knowledge Relationship Model of Enterprise Architecture and Top Management Roles, Hawa Ahmad, Aishah Ahmad, and Nik Hazliana Nik Abdullah Hafaz

PDF

Improving pathology reports using business intelligence techniques: An experimental study, Yasmine Alahmdai and Peter O’Donnell

PDF

The Effect of ICT Self-Discipline in the Workplace, Balsam Al-Dabbagh, Eusebio Scornavacca, Allan Sylvester, and David Johnstone

PDF

The Influence of Trust and subjective Norms on Citizens’ Intentions to Engage in E-participation on E-government Websites, Abdullah Alharbi, Kyeong Kang, and Prof. Igor Hawryszkiewycz

PDF

A Multi Perspective Approach for Understanding the Determinants of Cloud Computing Adoption among Australian SMEs, Salim Alismaili, Mengxiang Li, Jun Shen, and Qiang He

PDF

Investigating the Role of Socio-organizational Factors in the Information Security Compliance in Organizations, Ahmed AlKalbani, Hepu Deng, and Booi Kam

PDF

Analysis of Research in Healthcare Data Analytics, Mohammad Ahmad Alkhatib, Amir Talaei-Khoei, and Amir Hossein Ghapanchi

PDF

The Potential Impact of Digital Currencies on the Australian Economy, Mustafa Ally, Michael Gardiner, and Michael Lane

PDF

A Conceptual Framework for Accountability in Cloud Computing Service Provision, Zahir Al-Rashdi, Martin Dick, and Ian Storey

PDF

Information Security Policy: A Management Practice Perspective, Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, and Shanton Chang

PDF

A Process Model for Crowdsourcing: Insights from the Literature on Implementation, Alireza Amrollahi

PDF

Supporting ‘Good Habits’ through User-Led Design of Food Safety Applications – Findings from a Survey of Red Meat Consumers, Adeola Bamgboje-Ayodele, Leonie Ellis, and Paul Turner

PDF

Interdisciplinary Translation of Comparative Visualization, James Birt, Dirk S. Hovorka, and Jonathan Nelson

PDF

Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework, Deborah Bunker, Catherine Hardy, Abdul Babar, and Kenneth J Stevens

PDF

Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails, Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac

PDF

Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study, Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo

PDF

Ethical Implications of IT-enabled Information Flows Conceived as Intermediaries or Mediators, Dubravka Cecez-Kecmanovic and Olivera Marjanovic

PDF

A Framework for Techniques for Information Technology Enabled Innovation, Yajur Chadha, Aditi Mehra, Shirley Gregor, and Alex Richardson

PDF

The Development Strategy of IT Capability: A Contingency Perspective, Po-Yen Chen and Chorng-Shyong Ong

PDF

Using Design Science to Build a Watermark System for Cloud Rightful Ownership Protection, Brian Cusack and Reza Khaleghparast

PDF

Implications of Managing Health related Records and Relevant Information Systems within Intergovernmental Agencies, Adam Davies, Roberto Bergami, and Shah Jahan Miah

PDF

Strategy in a Digital World, Melinda D’Cruz, Greg Timbrell, and Jason Watson

PDF

Disruptive Transformation of Enterprise Supply Chain Performance: Strategic Business Networks to Improve Business Value, Steve Elliot, Martin McCann, and Kory Manley

PDF

COMBINING THE FOGG BEHAVIOURAL MODEL AND HOOK MODEL TO DESIGN FEATURES IN A PERSUASIVE APP TO IMPROVE STUDY HABITS, Justin Filippou, Christopher Cheong, and France Cheong

PDF

Assessment Issues in Mathematics: Design Science Approach for developing an Expert-System Based Solution, Hussein Genemo and Shah Jahan Miah

PDF

Business Process Management: Saving the Planet?, Shahrzad Roohy Gohar and Marta Indulska

PDF

Visualizing the invisible – the relentless pursuit of MTech Imaging, Jenson Chong-Leng Goh, Jeffery Beng-Huat Tan, and Janice Sio-Nee Tan

PDF

Evaluating the Business Value of CPOE for Cancer Care in Australia: A Resource Based View Perspective, Peter Haddad, Jonathan L. Schaffer, and Nilmini Wickramasinghe

PDF

Shared Secret Places: Social Media and Affordances, Ella Hafermalz, Dirk S. Hovorka, and Kai Riemer

PDF

Participating or Not Participating? A Sociomaterial Perspective of the Embeddedness of Online Communities in Everyday Life, Geri Harris and Babak Abedin

PDF

Why customers participate in social commerce activities? – A laddering analysis, Syahida Hassan, Janet Toland, and Mary Tate

PDF

ICT’s Effect on Parents’ Feelings of Presence, Awareness, and Connectedness during a Child’s Hospitalization, Abbas Heidari, Yahya Kazemzadeh, and Greg Wadley

PDF

ARCHITECTING END-TO-END INFORMATION SERVICES FOR CONTINUOUS STUDENT BEHAVIOUR MANAGEMENT, Wayne Hellmuth and Glenn Stewart

PDF

Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective, Alireza Heravi, Sameera Mubarak, and Kim-Kwang Raymond Choo

PDF

Information Security Strategy in Organisations: Review, Discussion and Future Research Directions, Craig A. Horne, Atif Ahmad, and Sean B. Maynard

PDF

Open data adoption in Australian government agencies: an exploratory study, Mohammad Alamgir Hossain and Caroline Chan

PDF

Towards knowledge sharing in disaster management: An agent oriented knowledge analysis framework, Dedi Iskandar Inan, Ghassan Beydoun, and Simon Opper

PDF

A Theoretical Approach to initiate Mobile Assisted Language Learning among school leavers and University Students of Sri Lanka, Fazeena Jamaldeen, Yamaya Ekanayaka, and Kamalanath Hewagamage

PDF

SOA Governance – Road into Maturity, George Joukhadar and Fethi Rabhi

PDF

Intelligent audit code generation from free text in the context of neurosurgery, Sedigheh Khademi, Pari Delir Haghighi, Philip Lewis, Frada Burstein, and Christopher Palmer

PDF

A DSS framework for maintaining relevant features of Small Business B2C Websites, Madhury Khatun and Shah Jahan Miah

PDF

How Fluffy is the Cloud?: Cloud Intelligence for a Not-for-profit Organisation, Purva Koparkar and Dale MacKrell

PDF

Open Food Network: the Role of ICT to Support Regional Food Supply Chains in Australia, Sherah Kurnia, Serenity Hill, Md Mahbubur Rahim, Kirsten Larsen, Patrice Braun, and Danny Samson

PDF

Using Collaborative Visual Analytics for Innovative Industry-inspired Learning Activities, Olivera Marjanovic

PDF

An Analysis of Personal Information Privacy Concerns using Q-Methodology, Gregg Martin, Hritik Gupta, Stephen C. Wingreen, and Annette M. Mills

PDF

Knowledge Retention through Low-Tech Knowledge Sharing Channels in Loosely-Coupled Networks: A Human-Based Approach, Rosemary Van Der Meer and Karlheinz Kautz

PDF

The Use of ICT to preserve Australian Indigenous Culture and Language – a Preliminarily Proposal Using the Activity Theory Framework, Sarah Van Der Meer, Stephen Smith, and Vincent Pang

PDF

ICT and Health System Performance in Africa: A Multi-Method Approach, Lucas Mimbi and Felix Olu Bankole

PDF

IT Managers' Perception and Response to Digital Disruption: An Exploratory Study, Alemayehu Molla, Vanessa Cooper, and Vass Karpathiou

PDF

A Crowd Monitoring Framework using Emotion Analysis of Social Media for Emergency Management in Mass Gatherings, Minh Quan Ngo, Pari Delir Haghighi, and Frada Burstein

PDF

Leveraging ERP Implementation to Create Intellectual Capital: the Role of Organizational Learning Capability, Quang V. Nguyen, Mary Tate, Philip Calvert, and Benoit Aubert

PDF

Examining the social aspects of Enterprise Architecture Implementation: A Morphogenetic Approach, Edi Nuryatno and Philip Dobson

PDF

Antecedents for Successful Collaboration in Requirements Engineering, Risto Paavola and Petri Hallikainen

PDF

Implications of Environmental Uncertainty for Business-IT Alignment: A Comparative Study of SMEs and Large Organizations, Amitha Padukkage, Val Hooper, and Janet Toland

PDF

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, Agata McCormac, Dragana Calic, and Cate Jerram

PDF

A Comparative Analysis of MOOC - Australia’s Position in the International Education Market, Georg Peters, Doreen Sacker, and Jan Seruga

PDF

Barriers to the Integration of Information Technology within Early Childhood Education and Care Organisations: A Review of the Literature, Melinda Plumb and Karlheinz Kautz

PDF

Developing a Methodology for Online Service Failure Prevention: Reporting on an Action Design Research Project-in-Progress, Jacques Louis Du Preez, Mary Tate, and Alireza Nili

PDF

High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic, Gerhard Rauchecker and Guido Schryen

PDF

Exploring the roles of ICT in supporting sustainability practices, Abdon Carrera Rivera and Sherah Kurnia

PDF

Fears and Triggers: A Conceptual Study of Vendor-Supplied Maintenance and Maintenance Deferral of Standard Package Software, Christopher Savage, Karlheinz Kautz, and Rodney Clarke

PDF

Investigating the Impact of Learners’ Learning Styles on the Acceptance of Open Learner Models for Information Sharing, YongWee Sek, Hepu Deng, Elspeth McKay, and Minghui Qian

PDF

Virtualization Technology: Cross-VM Cache Side Channel Attacks make it Vulnerable, Abid Shahzad and Alan Litchfield

PDF

Multi-synchronous collaboration between desktop and mobile users: A case study of report writing for emergency management, Adrian Shatte, Jason Holdsworth, and Ickjai Lee

PDF

Virtualising Process Assessments to Facilitate Continual Service Improvement in IT Service Management, Anup Shresth, Aileen Cater-Steel, and Mark Toleman

PDF

A Conceptual Framework to Assess the Effectiveness of Rubric Tool, Phil Smith, Blooma John, and Jayan Kurian

PDF

Individual Level Culture Effects on Multi-Perspective iTrust in B2C E-commerce, Osama Sohaib and Kyeong Kang

PDF

Applying Adapted Big Five Teamwork Theory to Agile Software Development, Diane Strode

PDF

Defining and Conceptualizing Actionable Insight: A Conceptual Framework for Decision-centric Analytics, Shiang-Yen Tan and Taizan Chan

PDF

How to be a Good ‘Frand’ in China: an Exploratory Study of Effective Social Media Behaviours for Foreign Brands, Mary Tate, Hongzhi Gao, Hongxia Zhang, and David Johnstone

PDF

The Lived User Experience of Virtual Environments: Initial Steps of a Phenomenological Analysis in a Safety Training Setting, Marko Teräs, Hanna Teräs, and Torsten Reiners

PDF

Does Broadband Connectivity and Social networking sites build and maintain social capital in rural communities?, Sanjib Tiwari, Michael Lane, and Khorshed Alam

PDF

The challenges and opportunities of delivering wireless high speed broadband services in Rural and Remote Australia: A Case Study of Western Downs Region (WDR), Sanjib Tiwari, Michael Lane, and Khorshed Alam

PDF

Behavioural Dimensions for Discovering Knowledge Actor Roles Utilising Enterprise Social Network Metrics, Janine Viol, Rebecca Bernsmann, and Kai Riemer

PDF

Maturity of the Internet of Things Research Field: Or Why Choose Rigorous Keywords, Marta Vos

PDF

Exploring the Use of Enterprise 2.0 and Its Impact on Social Capital within a Large Organisation, Diana Wong, Rachelle Bosua, Sherah Kurnia, and Shanton Chang

PDF

Internal Versus External Recruitment – The Story of Three Consecutive Project Managers in an IT Project, Michelle Ye, Kristy de Salas, and Nadia Ollington

PDF

An SME's Adoption of a Cloud Based Integrated Management System (IMS) When Certifying against Management System Standards (MSS), Ming Hock Yew and Jenson Chong-Leng Goh

PDF

Green Information Technology as Administrative innovation - Organizational factors for successful implementation: Literature Review, Badrunnesa Zaman and Darshana Sedera

PDF

The Role of Translated Information Quality in a Global e-Retailing Context, Wanxian Zeng and Alex Richardson

PDF

Investigating the Impacts of Recommendation Agents on Impulsive Purchase Behaviour, Hui Zhu, Zherui Yang, Carol XJ Ou, Hongwei Liu, and Robert M. Davison

PDF

Evaluating the Utility of Research Articles for Teaching Information Security Management, Harry Zurita, Sean B. Maynard, and Atif Ahmad