81 research outputs found

    Health Information Seeking Behaviour during the Pandemic: Exploring the experiences of Chinese International Students

    Get PDF
    Many Chinese students choose Australia to study abroad. Studying abroad is a great opportunity, but it can also bring challenges for international students. In particular, during the Covid-19 pandemic, Chinese international students in Australian universities have new challenges in managing health information and misinformation across different platforms. There is currently a lack of research on Chinese international students’ health information-seeking strategies. A deeper understanding of Chinese international students’ social, cultural, and welfare support through online health information-seeking behaviour can be important. This can help support providers, educational institutions and governments to formulate better public health strategies for supporting international students. It will also help students better understand effective health information-seeking strategies. This study first synthesized relevant articles on information-seeking behaviour by international students. Then it identifies the gaps in studying Chinese international students’ health information-seeking behaviour. Finally, recommendations are made to bridge the identified gaps

    Understanding International Students’ Misinformation Behavior

    Get PDF
    Social media has made it easier for international students to draw on home-country sources of information, in addition to establishing new connections to host-country sources of information. However, social media has been shown to facilitate the spread of fake news, which could lead to increased exposure for those who are using sources from multiple countries. This exposure may result in increased vulnerability to the negative effects of misinformation. Understanding the misinformation experiences of international students will allow us to better assist a growing population of migrants and help us reformulate digital literacy strategies to be more effective in combating fake news. This research in progress article first synthesizes the literature on the spread of fake news and information behavior of international students. It then identifies the gap in our knowledge about the misinformation behavior of international students. Finally, it presents propositions for areas of research to bridge this gap

    Modeling the Information Needs of Informal Carers

    Get PDF
    There is not only a lack of research that conceptualises the information needs of informal carers but also a shortage in research that addresses those needs from the perspective of information systems in the health care system. This shortage of systematic and conceptualised research on information needs of informal carers often prohibits the information providers and developers from knowing what types of information informal carers need to support their roles and tasks as carers and to evaluate how well they are fulfilling the information needs of informal carers. Drawing upon the previous available research on information needs in general and information needs of informal carers in particular, this paper proposes a conceptual model of the information needs of informal carers. The conceptual model illustrates four abstraction groups of information needs of informal carers i.e. recognised demanded, unrecognised demanded, recognised undemanded, and unrecognised undemanded. The paper highlights the potential usefulness of the model

    Competencies of Cybersecurity Leaders: A Review and Research Agenda

    Get PDF
    Increasingly, large organisations are turning to cybersecurity leaders such as chief information security officers (CISOs) to protect their information resources against attack. The role of the cybersecurity leader is distinct from other cybersecurity professionals in its need for strategy and collaboration, and distinct from other business leaders in its need to maintain situational awareness against active adversaries. Because the role is so new, however, organisations and educators continue to conceptualise it as a senior technological role rather than a strategic, business-oriented role. This representation leaves open a gap between what is viewed as ‘business’ and what is viewed as ‘IT’ – a gap that can leave organisations vulnerable to attack. In this systematic review, we examine the literature on cybersecurity leaders to develop a picture of the competencies required. Following analysis, we propose a preliminary matrix of competencies required for cybersecurity leaders. We conclude with an agenda for further research

    A Framework for Exploring Conditional Factors Affecting User Participation in Information Systems Development

    Get PDF
    Improving user participation is critical to the success of information systems development (ISD). To this extent, Information Systems (IS) research posits that there are conditional factors that affecting the degree of user participation in ISD. The existing framework to identify these conditional factors lacks its explanatory power when different degrees of user participation are taken into consideration. As a result little is known how different degrees of user participation currently being employed in various IS projects can be enabled or facilitated. In this paper, based on Habermas’ theory of communicative action, we propose a framework to explore the conditional factors affecting different degrees of user participation in ISD. We demonstrate the value of the new framework by analysing the conditional factors that have been reported in the literature using the existing framework to inform the future research and development of the field

    Leveraging Enterprise 2.0 for Knowledge Sharing

    Get PDF
    Enterprise 2.0 takes on the full benefits of Web 2.0 services and has great potential in delivering business benefits. Many organizations have invested in this platform yet many are still hesitant to the adoption of it. This research paper explores the use of Enterprise 2.0 and how it can be incorporated into the changing business environment. The paper delineates the principles of KM and draw inferences where the appropriate use of Enterprise 2.0 will improve knowledge sharing. The underlying principles of KM strategy and the desired transformation discussed, illustrates challenges and gaps in knowledge sharing. The subsequent discussion explores the identified gaps and proposed the appropriate use of Enterprise 2.0, based on social capital theory. The study will contribute to a deeper understanding of the coherence of Enterprise 2.0 and knowledge sharing and identify the potential areas of improvements through appropriate use of Enterprise 2.0

    Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats

    Get PDF
    The explosion of online social networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees’ social networking behaviour, whether accidental or intentional, provides an opportunity for advanced persistent threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits. APT attackers use a spear-phishing method that targeted on key employees of victim organisations through social media in order to conduct reconnaissance and theft of confidential proprietary information. This conceptual paper posits OSN as the most challenging channel of information leakage and provides an explanation about the underlying factors of employees leaking information via this channel through a theoretical lens from information systems. It also describes how OSN becomes an attack vector of APT owing to employees’ social networking behaviour, and finally, recommends security education, training and awareness (SETA) for organisations to combat these threats

    Videoconference in Psychotherapy: Understanding research and practical implications

    Get PDF
    Psychologists started using information technologies, including Videoconference as new space for psychotherapy sessions. The technology role in building the relationship among psychologists and patients is still underexplored. Regardless of technology improvements, the Videoconference communication among therapists and patients can be affected by the features of audio and video quality, the lack of real and mutual gazes and the partial perception of body language. Applying a qualitative methodology based on semi-structured interviews, this study will focus on the role of technology in modulating messages, thoughts and emotions in the communication of a Videoconference therapy. The goal is to provide some understanding of how technology can contribute to the effectiveness of the therapy and enhance the understanding of the human communication by video. The implications of this study will be particularly relevant to detect the factors to be considered and improved in Videoconference Psychotherapy

    The Use of Online Social Networking for Higher Education from An Activity Theory Perspective

    Get PDF
    Social technologies including blogs, wikis, social bookmarking sites, photo sharing, video sharing and social networking sites (SNS) have been widely used to facilitate online social networking (OSN). We define OSN as a range of activities enabled by online social technologies and operationalised by a group of people. OSN is widely popular for non-educational purposes among students. However, OSN also has the potential to be appropriated and repurposed to support teaching and learning delivery in a formal learning environment. Despite the availability of implementation cases and trials, detailed studies on why and how lecturers and students appropriate and repurpose social technologies for OSN in education are still lacking. In addition, these understandings are seldom guided by any theoretical frameworks. This paper suggests the use of Activity Theory as the theoretical lens in investigating the use of OSN in higher education. A conceptual model of how social technologies can be appropriated and repurposed guided by the theoretical understandings is proposed and discussed

    Across the Great Digital Divide: Investigating the Impact of AI on Rural SMEs

    Get PDF
    Rural SMEs are generally at a digital disadvantage due to their size and location. The addition of AI to many business processes has the potential to minimize the existing divide. However, without access to this technology and its responsible usage, Rural SMEs could be placed at a more significant disadvantage. To understand the current situation we conducted interviews with Rural SMEs and related stakeholders. This paper draws on Activity Theory to develop a holistic understanding of the influence AI is having on the business processes of rural SMEs. We also consider the role of AI in terms of the existing digital divide frameworks, as well as the newly proposed fourth wave that captures the novel forms of disadvantage AI can perpetuate
    corecore