110 research outputs found

    Health Information Seeking Behaviour during the Pandemic: Exploring the experiences of Chinese International Students

    Get PDF
    Many Chinese students choose Australia to study abroad. Studying abroad is a great opportunity, but it can also bring challenges for international students. In particular, during the Covid-19 pandemic, Chinese international students in Australian universities have new challenges in managing health information and misinformation across different platforms. There is currently a lack of research on Chinese international students’ health information-seeking strategies. A deeper understanding of Chinese international students’ social, cultural, and welfare support through online health information-seeking behaviour can be important. This can help support providers, educational institutions and governments to formulate better public health strategies for supporting international students. It will also help students better understand effective health information-seeking strategies. This study first synthesized relevant articles on information-seeking behaviour by international students. Then it identifies the gaps in studying Chinese international students’ health information-seeking behaviour. Finally, recommendations are made to bridge the identified gaps

    Understanding International Students’ Misinformation Behavior

    Get PDF
    Social media has made it easier for international students to draw on home-country sources of information, in addition to establishing new connections to host-country sources of information. However, social media has been shown to facilitate the spread of fake news, which could lead to increased exposure for those who are using sources from multiple countries. This exposure may result in increased vulnerability to the negative effects of misinformation. Understanding the misinformation experiences of international students will allow us to better assist a growing population of migrants and help us reformulate digital literacy strategies to be more effective in combating fake news. This research in progress article first synthesizes the literature on the spread of fake news and information behavior of international students. It then identifies the gap in our knowledge about the misinformation behavior of international students. Finally, it presents propositions for areas of research to bridge this gap

    The Family Purchasing Process of Broadband Internet in Australia

    Get PDF
    This study investigates the purchase process of broadband internet among 10 Australian families. The objective of this study was to explore the collective decision-making process of families that led to the purchase of broadband. The findings of the research project is the model of the Family Broadband Purchasing Process which maps the critical events, the interplay of family roles and influencing factors that lead to the decision to purchase broadband. The findings from the study can be used to leverage current marketing strategies and contribute to a greater understanding of the lack of demand for broadband

    Modeling the Information Needs of Informal Carers

    Get PDF
    There is not only a lack of research that conceptualises the information needs of informal carers but also a shortage in research that addresses those needs from the perspective of information systems in the health care system. This shortage of systematic and conceptualised research on information needs of informal carers often prohibits the information providers and developers from knowing what types of information informal carers need to support their roles and tasks as carers and to evaluate how well they are fulfilling the information needs of informal carers. Drawing upon the previous available research on information needs in general and information needs of informal carers in particular, this paper proposes a conceptual model of the information needs of informal carers. The conceptual model illustrates four abstraction groups of information needs of informal carers i.e. recognised demanded, unrecognised demanded, recognised undemanded, and unrecognised undemanded. The paper highlights the potential usefulness of the model

    Competencies of Cybersecurity Leaders: A Review and Research Agenda

    Get PDF
    Increasingly, large organisations are turning to cybersecurity leaders such as chief information security officers (CISOs) to protect their information resources against attack. The role of the cybersecurity leader is distinct from other cybersecurity professionals in its need for strategy and collaboration, and distinct from other business leaders in its need to maintain situational awareness against active adversaries. Because the role is so new, however, organisations and educators continue to conceptualise it as a senior technological role rather than a strategic, business-oriented role. This representation leaves open a gap between what is viewed as ‘business’ and what is viewed as ‘IT’ – a gap that can leave organisations vulnerable to attack. In this systematic review, we examine the literature on cybersecurity leaders to develop a picture of the competencies required. Following analysis, we propose a preliminary matrix of competencies required for cybersecurity leaders. We conclude with an agenda for further research

    A Framework for Exploring Conditional Factors Affecting User Participation in Information Systems Development

    Get PDF
    Improving user participation is critical to the success of information systems development (ISD). To this extent, Information Systems (IS) research posits that there are conditional factors that affecting the degree of user participation in ISD. The existing framework to identify these conditional factors lacks its explanatory power when different degrees of user participation are taken into consideration. As a result little is known how different degrees of user participation currently being employed in various IS projects can be enabled or facilitated. In this paper, based on Habermas’ theory of communicative action, we propose a framework to explore the conditional factors affecting different degrees of user participation in ISD. We demonstrate the value of the new framework by analysing the conditional factors that have been reported in the literature using the existing framework to inform the future research and development of the field

    How Trust Is Formed in Online Health Communities: A Process Perspective

    Get PDF
    People are increasingly looking for health-related information and support to empower their self-management and decision making. Online health communities have not only become an important alternative source of patient-centered information but also appear to serve an emotional support role in connecting patients who have similar medical conditions. Trust is critical to sustain their continuous use and enhance their involvement. This is because each community member is typically identified only by a pseudonym, important personal information is often revealed, the quality of information provided by others varies, and the consequences of acting on incorrect advice can be severe. Using semi-structured interviews and data from postings, this study qualitatively explores the trust development between users of forum-based online health communities. Based on data from a wide range of medical conditions, we formulated a three-process framework for establishing trust that conceptualizes how users build trust through the text-based medium and how they progress from one process to another. We contribute to theory by extending existing variance theories in trust to a hybrid process theory which explains the dynamic progression from one state to another. It suggests several design foci that can enhance user experience of these forums

    Exploring the Use of Enterprise 2.0 and Its Impact on Social Capital within a Large Organisation

    Get PDF
    Despite the rampant adoption of Enterprise 2.0, there is lack of empirical evidence of how Enterprise 2.0 is aptly supporting the business objectives. Social capital theory will be used as a theoretical lens to understand the impact and implications of individual use of Enterprise 2.0. To ascertain the impact from the use of Enterprise 2.0 on the various dimensions of social capital, a single in-depth qualitative case study was conducted with a large professional services organisation. The findings unfold the different areas of impacts based on actual individual use and experience. The research concludes with a framework delineating the intertwined relationship between each social capital dimensions

    Leveraging Enterprise 2.0 for Knowledge Sharing

    Get PDF
    Enterprise 2.0 takes on the full benefits of Web 2.0 services and has great potential in delivering business benefits. Many organizations have invested in this platform yet many are still hesitant to the adoption of it. This research paper explores the use of Enterprise 2.0 and how it can be incorporated into the changing business environment. The paper delineates the principles of KM and draw inferences where the appropriate use of Enterprise 2.0 will improve knowledge sharing. The underlying principles of KM strategy and the desired transformation discussed, illustrates challenges and gaps in knowledge sharing. The subsequent discussion explores the identified gaps and proposed the appropriate use of Enterprise 2.0, based on social capital theory. The study will contribute to a deeper understanding of the coherence of Enterprise 2.0 and knowledge sharing and identify the potential areas of improvements through appropriate use of Enterprise 2.0

    Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats

    Get PDF
    The explosion of online social networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees’ social networking behaviour, whether accidental or intentional, provides an opportunity for advanced persistent threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits. APT attackers use a spear-phishing method that targeted on key employees of victim organisations through social media in order to conduct reconnaissance and theft of confidential proprietary information. This conceptual paper posits OSN as the most challenging channel of information leakage and provides an explanation about the underlying factors of employees leaking information via this channel through a theoretical lens from information systems. It also describes how OSN becomes an attack vector of APT owing to employees’ social networking behaviour, and finally, recommends security education, training and awareness (SETA) for organisations to combat these threats
    corecore