152 research outputs found

    Exploring the ACIS Community through the Analysis of Co-authorship across Institutions

    Get PDF
    Population-focused care is gaining importance due to an increase in the number of people with long-term conditions. A population-focused care addresses the care needs of a group of patients who share a common trait. Primary health care (PHC) being the first point of contact with a health system, our work aims to predict and analyse this population-level workload at a PHC centre. We followed a design science research (DSR) to develop a workload prediction model. As a part of this work, we identified that current patient information models lack the ability to support population-level analysis. In this paper, we discuss an extended ontology of patient information models to support population-level workload analysis. We describe the three cycles of DSR applied to develop our ontology. Then, we discuss the existing health data models. Thus, this paper makes a domain-specific application of DSR to develop a patient information model that supports population-level analysis

    Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach

    Get PDF
    This study aims to explore the social roles of the people who can influence young home computer users (HCUs) in Vietnam, as well as the interactions that make those people influential. Since HCUs are considered the weakest link in the security chain and cyber-threats can attack organisation’s information systems indirectly via these HCUs, it is therefore necessary to identify their sources of security influence for designing effective intervention. To this end, the ego-centric network analysis approach was employed to analyse the personal networks of security influence of 116 HCUs, comprising 548 influential sources in total. Close relationships such as family members, partners, friends, and colleagues were predominantly nominated as capable of influencing HCUs’ security behaviours. Furthermore, these sources influence the HCUs by possessing the power bases of expert, reward, and coercive, as well as holding legitimate positions that make them influential

    Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal

    Get PDF
    Over the past years, a large amount of studies has advanced knowledge that explains how individuals react to information security cues and why they are motivated to perform secure practices. Nevertheless, those studies predominantly set their focus on the adoption of secure practices at an individual level; therefore they were unable to analyse such adoption at the higher level. As a consequence, the formation and dissemination processes of information security perceptions were overlooked despite their importance. Understanding those processes would inform methods to distribute effectively desirable information security perceptions within the workplace, while potentially explaining why in some cases implementation of information security measures was not successful at changing the employees’ beliefs and behaviours. The first part of this paper reviews the concept of information security climate that emerge from the individual’s interactions with the work environment, which has been under researched and investigated inconsistently. The second part begins with discussing the influence mechanisms that could disseminate information security climate perceptions, then suggests the adoption of social network analysis techniques to analyse those mechanisms. As a result, the paper forwards an integrated framework about information security climate perceptions, as well as proposes a research agenda for future investigations on how those perceptions could be formed and disseminated within the workplace

    Understanding the Formation of Information Security Climate Perceptions: A Longitudinal Social Network Analysis

    Get PDF
    Business process capture is a first step in the larger endeavour of business process management. In this paper we view business process capture as a knowledge conversion process. We explore the conversion of knowledge when business analysts capture information about business processes from domain experts. We identify seven process capture activities in a thematic analysis of comments made by business analysts in response to open-ended questions in an online survey. The seven activities are involving, simplifying, tailoring, training, combining, confirming, and engaging soft skills. We show how these activities involve the transfer of tacit and explicit knowledge between the business analyst and the domain expert and how the transfer conforms to the SECI modes of knowledge conversion, well known in the research domain of knowledge management. The paper contributes a SECI-based knowledge conversion model of business process capture and insight for business analysts about business process capture activities

    Exploring the Antecedents of Shadow Information Security Practices

    Get PDF
    Employees are both the first line of defence in organisations as well as a significant source of vulnerability. Behavioural research in information security (InfoSec) has studied compliance of employees with organisational directives. Less understood are ‘shadow security practices’–a related category of behaviour where employees invent InfoSec workarounds albeit with the intention of still complying with organisational InfoSec directives. In this research-in-progress paper, we present the theoretical development of a model, by conducting in-depth reviews of the relevant and multidisciplinary literatures, to identify the potential antecedents of the employees\u27 intention to perform shadow security

    Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach

    Get PDF
    The research domain of end-user’s information security behaviours has been gaining much attention over the recent years. While the nature of intention to perform information security behaviours are being revealed, there are still gaps in this area. In particular, few studies have addressed whether such intention remains across contexts, especially from home to public places. Secondly, the amount of the cyber-threats swells with the increase of personal devices with the rapid adoption of the BYOD trend. This research employed MSEM methods to develop a conceptual model based on Protection Motivation Theory by using data collected from 252 higher education students in a BYOD Australian university. Our findings confirmed and explored in details how intention to perform information security behaviours varied due to the change of context. Academics and practitioners could mitigate the security gap by focusing on the intention’s differences discussed in our findings

    ZnO/CdS Bilayer used for Electrode in Photovoltaic Device

    Get PDF
    In this article we present the fabrication and characterization of the nanoporous ZnO and/or ZnO/CdS thin films onto indium doped-tin oxide (ITO) substrates, based on the thermal evaporation technique followed by thermal treatment. The preparation method was relatively simple and low-cost for large scale uniform coating to produce clean, dense and strong adhesion to substrate thin films. The nanostructured ZnO and ZnO/CdS thin films were characterized by X-ray diffraction (XRD) and field emission scanning electron microscope (FE-SEM). The nanostructured ZnO/CdS bilayer film was used in a photo-electrochemical (PEC) cell as a working electrode and a Pt net as a counter electrode. The results show that the photovoltaic cell with nanostructured ZnO/CdS bilayer film electrode has significantly improved photoelectric capability in comparison with that of ZnO electrode

    Explainable Information Security: Development of a Construct and Instrument

    Get PDF
    Despite the increasing efforts to encourage information security (InfoSec) compliance, employees’ refusal to follow and adopt InfoSec remains a challenge for organisations. Advancements in the behavioural InfoSec field have recently highlighted the importance of developing usable and employeecentric InfoSec that can motivate InfoSec compliance more effectively. In this research, we conceptualise the theoretical structure for a new concept called explainable InfoSec and develop a research instrument for collecting data about this concept. Data was then collected from 724 office workers via an online survey. Exploratory and confirmatory factor analyses were performed to validate the theoretical structure of the explainable InfoSec construct, and we performed structural equation modelling to examine the construct’s impact on intention to comply with organisational InfoSec. The validated theoretical structure of explainable InfoSec consists of two dimensions, fairness and transparency, and the construct was found to positively influence compliance intention

    Digital Kaizen: An Approach for Conducting Large-Scale Digital Transformation Projects

    Get PDF
    While digital transformation creates opportunities across all industries, many businesses still do not know how to embark on this journey and hesitate to commit resources to such an unclear initiative. By using the interpretive case study method, this paper investigates how Digital Kaizen–a philosophy that focuses on making continuous digital improvements–could guide large-scale digital transformation activities in incremental steps. Our findings show that the adoption of Digital Kaizen has urged the investigated organization to continuously address cross-functional issues that are aligned with their strategic business goals, through implementing incremental digital changes that improve business processes and people engagement. Subsequently, these activities lead to sustainable and scalable digital transformation success that re-defines the organization’s value creation processes and identity. This research suggests a new strategy for conducting large-scale digital transformation, by integrating Kaizen philosophy into digital transformation practices

    Nanocomposite Thin Film TiO2/CdS Electrodes Prepared by Thermal Evaporation Process for Photovoltaic Applications

    Get PDF
    The incorporation of cadmium sulfide (CdS) into TiO2 nanoparticle thin films was investigated. The nanoparticle TiO2 thin film onto an indium doped–tin oxide (ITO) substrate was deposited by Electron Beam Deposition (EBD) combined with thermal process. Then a CdS thin film was vacuum-deposited onto the pre-deposited TiO2 film by a thermal evaporation technique. The obtained TiO2/CdS was characterized by X-ray diffraction (XRD), field emission scanning electron microscope (FE-SEM). The TiO2/CdS nanocomposite film was used in a photo-electrochemical (PEC) cell as a working electrode and a platinum electrode as a counter electrode. The electrolyte solution contains 1 M KCl and 0.1M Na2S. The results show that the cell with TiO2/CdS composite film electrode has significantly improved photoelectric capability in comparison with that of the pure TiO2 thin films
    • …
    corecore