Australasian Journal of Information Systems https://ajis.aaisnet.org/index.php/ajis <p>The <cite>Australasian Journal of Information Systems</cite> (AJIS) is an international quality, peer reviewed journal covering innovative research and practice in Information Systems. Specifically, the journal seeks to publish 'interesting and sufficiently rigorous' research that is sufficiently grounded in the “So What?” question</p> <p> </p> Australasian Association for Information Systems en-US Australasian Journal of Information Systems 1326-2238 <p>AJIS publishes open-access articles distributed under the terms of a Creative Commons Non-Commercial and Attribution License&nbsp;which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and AJIS are credited. All other rights including granting permissions beyond those in the above license remain the property of the author(s).</p> Digital Transformation: An Enterprise Transformation Theory Perspective https://ajis.aaisnet.org/index.php/ajis/article/view/4259 <p>Digital Transformation (DT) has emerged as one of the most talked-about phenomena of the decade. The rush of things around DT also exposes its challenges towards effectively integrating digital technologies into the scheme of things. The proliferating literature on DT offers a fragmented understanding and is unclear about the constituents and configuration of the phenomena. The above concerns primarily arise from insufficient theoretical grounding and deficiencies in the extant conceptualizations. To address these concerns, the article posits an over-arching research question to examine the phenomena while theoretically uncovering its foundational elements. Accordingly, the study resorts to the enterprise transformation framework to explicate the transformative aspects based on a two-phase analysis. The first phase adopts a text-mining approach for uncovering the latent themes underlying the DT scholarship, followed by a qualitative approach involving content analysis. We finally propose a theoretically motivated conceptualization of the tenets of DT. We specifically investigate the phenomenon's scope, ways, means, and ends. The proposed framework is further validated following a multi-case analysis. Our conceptualization grounds and establishes the significance of foundational elements having a theoretical basis for identifying DT. Our examination offers an implementation guide for the practice, which we delineate subsequently.</p> Rahul Kumar Rahul Thakurta Copyright (c) 2024 Rahul Kumar, Rahul Thakurta https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-09-04 2024-09-04 28 10.3127/ajis.v28.4259 Robodebt: A Socio-Technical Case Study of Public Sector Information Systems Failure https://ajis.aaisnet.org/index.php/ajis/article/view/4681 <p>Large-scale public sector information systems (PSIS) that administer social welfare payments face considerable challenges. Between 2014 and 2023, an Australian government agency conceived and implemented the Online Compliance Intervention (OCI) scheme, widely referred to as Robodebt. The scheme's primary purpose was to apply digital transformation in order to reduce labour costs and increase recovery of overpayments. Among its key features were a simplified, but inherently erroneous, estimation method called income averaging, and a new requirement that welfare recipients produce documentation for income earned years earlier. Failure by welfare recipients to comply with mandates resulted in the agency recovering what it asserted to be overpayments. This article presents a case study of Robodebt and its effects on over 1 million of its clients. The detailed case study relies on primary data through Senate and other government hearings and commissions, and secondary data, such as media reports, supplemented by academic sources. Relevant technical features include (1) the reliance on the digital persona that the agency maintains for each client, (2) computer-performed inferencing from client data, and (3) automated decision-making and subsequent action. This article employs a socio-technical systems approach to understanding the factors underlying a major PSIS project failure, by focusing on the system's political and public service sponsors; its participants (users); the people affected by it (usees); and the broader economic, social, and political context. Practical and theoretical insights are presented, with the intention of highlighting major practical lessons for PSIS, and the relevance of an articulated socio-technical frame for PSIS.</p> Roger Clarke Katina Michael Roba Abbas Copyright (c) 2024 Roger Clarke, Katina Michael, Roba Abbas https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-09-05 2024-09-05 28 10.3127/ajis.v28.4681 Requirements Risk Management for Continuous Development: Organisational Needs https://ajis.aaisnet.org/index.php/ajis/article/view/4441 <p>Information systems development has recently evolved from traditional to agile and continuous forms. Continuous development (CD) methods, such as development and operations (DevOps), integrate many well-regarded parts of agile development and add collaboration among an organisation’s development, operations and quality assessment departments. We argue that requirements risk management (RRM) poses additional challenges to projects where development work is carried out quickly and continuously. However, in the literature, most methods for prioritising requirements and managing risks are more suited to traditional development. This raises the need for new tools and methodologies to meet CD challenges. As these challenges constantly evolve, project management must be able to control CD, changes in the determination of requirements and the accompanying risks. Based on a systematic literature review, we define the key features of CD and develop a conceptual three-dimensional framework that can be used to understand the organisational needs of RRM for CD.</p> Sanna Kainulainen Tuure Tuunanen Tero Vartiainen Copyright (c) 2024 Sanna Kainulainen, Tuure Tuunanen, Tero Vartiainen https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-09-05 2024-09-05 28 10.3127/ajis.v28.4441 Researcher-Practitioner Collaboration in Action Design Research https://ajis.aaisnet.org/index.php/ajis/article/view/4281 <p>Action Design Research (ADR) is a well-known research method within Design Science Research (DSR). An essential characteristic of the ADR method is the need for researcher-practitioner collaboration (RPC). While there is abundant research on RPC regarding information systems projects in general concerning explanatory and normative knowledge, there is very limited prescriptive knowledge on how to execute RPC in ADR projects. Successful collaboration in ADR projects is imperative since the development of socio-technical IT artefacts requires frequent interaction in organisational contexts. However, RPC can be hard to manage due to competing interests. Therefore, the purpose of this paper is to present prescriptive knowledge for how to manage RPC. We have analysed a collaborative ADR project consisting of several researchers and practitioners. Based on a grounded theory approach, we have developed theoretical models based on challenges identified in an ADR project. The models provide prescriptive knowledge regarding: shape the IT artefact based on organisational intervention, exploit the mutual dependency between developing design principles and IT artefacts, and contextualise and generalise learning. Each model involves logical relationships between: conditions for the challenges, actions taken to address the challenges and consequences of the actions taken. The guidelines were deducted from the models and consist of recommendations that could be considered in future ADR projects.</p> Stefan Cronholm Hannes Göbel Anup Shrestha Copyright (c) 2024 Stefan Cronholm, Hannes Göbel, Anup Shrestha https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-09-05 2024-09-05 28 10.3127/ajis.v28.4281 (Why) Do We Trust AI?: A Case of AI-based Health Chatbots https://ajis.aaisnet.org/index.php/ajis/article/view/4235 <p>Automated chatbots powered by artificial intelligence (AI) can act as a ubiquitous point of contact, improving access to healthcare and empowering users to make effective decisions. However, despite the potential benefits, emerging literature suggests that apprehensions linked to the distinctive features of AI technology and the specific context of use (healthcare) could undermine consumer trust and hinder widespread adoption. Although the role of trust is considered pivotal to the acceptance of healthcare technologies, a dearth of research exists that focuses on the contextual factors that drive trust in such AI-based Chatbots for Self-Diagnosis (AICSD). Accordingly, a contextual model based on the trust-in-technology framework was developed to understand the determinants of consumers’ trust in AICSD and its behavioral consequences. It was validated using a free simulation experiment study in India (N = 202). Perceived anthropomorphism, perceived information quality, perceived explainability, disposition to trust technology, and perceived service quality influence consumers’ trust in AICSD. In turn, trust, privacy risk, health risk, and gender determine the intention to use. The research contributes by developing and validating a context-specific model for explaining trust in AICSD that could aid developers and marketers in enhancing consumers’ trust in and adoption of AICSD.</p> Ashish Viswanath Prakash Saini Das Copyright (c) 2024 Ashish Viswanath Prakash, Saini Das https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-05-15 2024-05-15 28 10.3127/ajis.v28.4235 Machine Learning Based Decision-Making: A Sensemaking Perspective https://ajis.aaisnet.org/index.php/ajis/article/view/4781 <p>The integration of machine learning (ML), functioning as the core of various artificial intelligence (AI)-enabled systems in organizations, comes with the assertion that ML models offer automated decisions or assist domain experts in refining their decision-making. The current research presents substantial evidence of ML’s positive impact on business and organizational performance. Nonetheless, there is a limited understanding of how decision-makers participate in the process of generating ML-driven insights and enhancing their comprehension of business environments through ML outcomes. To enhance this engagement and understanding, this study examines the interactive process between decision-makers and ML experts as they strive to comprehend an environment and gather business insights for decision-making. It builds upon Weick’s sensemaking model by integrating ML’s pivotal role. By conducting interviews with 31 ML experts and ML end-users, we explore the dimensions of sensemaking in the context of ML utilization for decision-making. Consequently, this study proposes a process model which advances the organizational ML research by operationalizing Weick’s work into a structured ML-driven sensemaking model. This model charts a pragmatic pathway, outlining the interaction sequence between decision-makers and ML tools as they navigate through recognizing and utilizing ML, exploring opportunities, assessing ML model outcomes, and translating ML models into action, thereby advancing both the theoretical framework and its practical deployment in organizational contexts.</p> Jingqi (Celeste) Li Morteza Namvar Ghiyoung P. Im Saeed Akhlaghpour Copyright (c) 2024 Jingqi (Celeste) Li, Morteza Namvar, Ghiyoung P. Im, Saeed Akhlaghpour https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-05-15 2024-05-15 28 10.3127/ajis.v28.4781 “Use” as a Conscious Thought: Towards a Theory of “Use” in Autonomous Things https://ajis.aaisnet.org/index.php/ajis/article/view/4611 <p>The way users perceive and use information systems artefacts has been mainly studied from the notion of behavioral beliefs, deliberate cognitive efforts, and physical actions performed by human actors to produce certain outcomes. The next generation of information systems, however, can sense, respond, and adapt to environments without necessitating similar cognitive efforts, physical contact, or explicit instructions to operate. Therefore, by leveraging theories of consciousness and technology use, this research aims to advance an alternative understanding of the "use" associated with the next generation of IS artefacts that do not require deliberate cognitive efforts, physical manipulation, or explicit instructions to yield outcomes. The theory and proposed model were refined and validated through the burst detection technique, IS expert involvement (n=10), a pilot study (n=130), and end-user surveys (n= 119). Structural equating modelling techniques were employed to test the theory. We show that unlike the manually operated IS artefacts, the “use” of a fully autonomous artefact is a <em>conscious thought</em> rather than a <em>physical activity</em> of operating a system to produce certain outcomes. We argue that, unlike the traditional notions of use associated with manually operated technologies, <em>conscious use</em> is not characterized solely by behavioral beliefs stemming from logical and reflective cognitive and physical efforts (e.g., effort expectancy). We propose the notion of conscious use within the context of fully autonomous entities and empirically validate its measure. Additionally, we offer recommendations for future research directions in this area. The conceptualization of this new theory for fully autonomous IS artefacts adds significant academic value to the literature given the convergence of AI-based machine learning systems and cognitive computing systems.</p> <p> </p> Gohar Khan A Karim Feroz Copyright (c) 2024 Gohar Khan, A Karim Feroz https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-05-15 2024-05-15 28 10.3127/ajis.v28.4611 Sociotechnical perspectives of digital technologies in sustainable mining https://ajis.aaisnet.org/index.php/ajis/article/view/4369 <p class="JnlBody">This paper adopts an interpretive case study approach to understand the role of digital technologies in addressing seemingly contradictory sustainability goals in mining. The sociotechnical model of information systems was used as a framework to guide the analysis of twenty-five in-depth interviews with globally dispersed digital technology experts working collaboratively at an industry-leading hi-tech mining solutions company. The sociotechnical-led thematic analysis findings highlight the trade-offs experts face in balancing narrow technological imperatives and economic outcomes with broader sustainability goals. The analysis moves beyond the technological and economic to a harmonious perspective of social, human, environmental, and technological interactions. A visual thematic map is presented to aid practitioners in designing and optimally implementing digital technologies to simultaneously address the United Nations Sustainable Development Goals while prioritising business sustainability. We conclude by drawing from the proposed sociotechnical perspectives approach for digital sustainability to provide scholars with possible pathways for future responsible information systems research.</p> Warren Gabryk Rennie Naidoo Copyright (c) 2024 Warren Gabryk, Rennie Naidoo https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-05-15 2024-05-15 28 10.3127/ajis.v28.4369 What prevents organisations from achieving e-HRM potential? https://ajis.aaisnet.org/index.php/ajis/article/view/3877 <p class="References" style="margin-left: 0cm; text-indent: 0cm;">Use of electronic human resource management (e-HRM) offers the prospect of enabling the human resource management (HRM) function to take on a strategic partner’s role in organisations. Despite the pervasive expansion of e-HRM use, there is no clear understanding of why organisations are not achieving e-HRM potential. We address this issue by investigating e-HRM adoption factors and their influence on information technology (IT) use potential to automate, informate and transform the HRM function in a sequential manner. In particular, we examine HRM professionals’ experiences with e-HRM use, including challenges, successes, and outcomes. We identified e-HRM adoption factors that enable and that constrain each stage of e-HRM use. With a focus on the inhibiting factors, our findings suggest that e-HRM potential hindered already in the automation stage diminishes e-HRM potential to subsequently informate and to transform the e-HRM function.</p> Arnela Ceric Kevin Parton Copyright (c) 2024 Arnela Ceric, Kevin Parton https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-29 2024-01-29 28 10.3127/ajis.v28.3877 Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework https://ajis.aaisnet.org/index.php/ajis/article/view/4215 <p>Organisations are increasingly practising business analytics to generate actionable insights that can guide their digital business transformation. Transforming business digitally using business analytics is an ongoing process that requires an integrated and disciplined approach to leveraging analytics and promoting collaboration. An emerging business analytics practice, Data Operations (DataOps), provides a disciplined approach for organisations to collaborate using analytical information for digital business transformation. We propose a conceptual framework by reviewing the literature on business analytics, DataOps and organisational information processing theory (OIPT). This conceptual framework explains how organisations can employ DataOps as an integrated and disciplined approach for developing the analytical information processing capability and facilitating boundary-spanning activities required for digital business transformation. This research (a) extends current knowledge on digital transformation by linking it with business analytics from the perspective of OIPT and boundary-spanning activities, and (b) presents DataOps as a novel approach for using analytical information for digital business transformation.</p> Jia Xu Humza Naseer Sean Maynard Justin Filippou Copyright (c) 2024 Jia Xu, Humza Naseer, Sean Maynard, Justin Filippou https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-29 2024-01-29 28 10.3127/ajis.v28.4215 Mobile Identity Protection: The Moderation Role of Self-Efficacy https://ajis.aaisnet.org/index.php/ajis/article/view/4397 <p class="References" style="margin-left: 0cm; text-indent: 0cm;">The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting identity in a mobile environment is a problem. This study develops a model that examines the role of identity protection self-efficacy in increasing users’ motivation intentions to achieve actual mobile identity protection. Our research found that self-efficacy significantly affects the relationship between users’ perceived threat appraisal and their motivational intentions for identity protection. The relation between mobile users’ protection, motivational intentions, and actual mobile identity protection actions was also found to be significant. Additionally, the findings revealed the considerable impact of awareness in fully mediating between self-efficacy and actual identity protection. The model and its hypotheses are empirically tested through a survey of 383 mobile users, and the findings are validated through a panel of experts, thus confirming the impact of self-efficacy on an individual’s identity protection in the mobile context.</p> Yasser Alhelaly Gurpreet Dhillon Tiago Oliveira Copyright (c) 2024 Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliviera https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-29 2024-01-29 28 10.3127/ajis.v28.4397 Doing Big Things in a Small Way: A Social Media Analytics Approach to Information Diffusion During Crisis Events in Digital Influencer Networks https://ajis.aaisnet.org/index.php/ajis/article/view/4429 <p>Digital influencers play an essential role in determining information diffusion during crisis events. This paper demonstrates that information diffusion (retweets) on the social media platform Twitter (now X) highly depends on digital influencers’ number of followers and influencers’ location within communication networks. We show (study 1) that there is significantly more information diffusion in regional (vs. national or international) crisis events when tweeted by micro-influencers (vs. meso- and macro-influencers). Further, study 2 demonstrates that this pattern holds when micro-influencers operate in a local location (are located local to the crisis). However, effects become attenuated when micro-influencers are situated in a global location (outside of the locality of the event). We term this effect ‘influencer network compression’ – the smaller in scope a crisis event geography (regional, national, or international) and influencer location (local or global) becomes, the more effective micro-influencers are at diffusing information. This shows that those who possess the most followers (meso- and macro-influencers) are less effective at attracting retweets than micro-influencers situated local to a crisis. As online information diffusion plays a critical role during public crisis events, this paper contributes to both practice and theory by exploring the role of digital influencers and their network geographies in different types of crisis events.</p> Shohil Kishore Amy Errmann Copyright (c) 2024 Shohil Kishore, Amy Errmann https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-01-28 2024-01-28 28 10.3127/ajis.v28.4429 AJIS Thinking Differently in Service of The Community https://ajis.aaisnet.org/index.php/ajis/article/view/5427 Michael Davern Stuart Black Copyright (c) 2024 Michael Davern; Stuart Black https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-09-05 2024-09-05 28 10.3127/ajis.v28.5427 Editor’s Comment https://ajis.aaisnet.org/index.php/ajis/article/view/5237 <p>This is the third and my farewell editorial as editor-in-chief (EiC) of the AJIS. Three plus years, 40 months have passed since I &nbsp;took over the EiC role after an appointment by the AAIS search panel.</p> Karlheinz Kautz Copyright (c) 2024 Karlheinz Kautz https://creativecommons.org/licenses/by-nc/3.0/au/ 2024-05-16 2024-05-16 28 10.3127/ajis.v28.5237