About
101
Publications
84,075
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,747
Citations
Publications
Publications (101)
While most crowdsourcing (CS) cases in the literature focus on commercial organisations, little is known about volunteers’ motivation of initial and continued participation in not-for-profit CS projects and importantly, about how the motivations may change over time. It is vital to understand motivation and motivational dynamics in a not-for-profit...
The spread of the internet has led to the evolution of on-line communities (OCs) as collectives of members who share common goals. Whilst many OCs involve individuals who engage voluntarily for mutual interest, commercial and government organizations engage involuntary stakeholders in their less egalitarian OCs. Although research has explored how m...
Crowdsourcing (CS) by cultural and heritage institutions engage volunteers in online projects without monetary compensation. Uncertainty concerning online volunteer motivation has led to a growing body of academic research. This study contributes to that debate, by extending focus to CS volunteer work in nonprofit cultural institutions where no mon...
There has been a growing research interest in understanding knowledge sharing in agile development. Yet, empirical research that sheds light on its underlying practices, such as pair programming, is evolving. This study uses insights from coopetition and software literature to focus inquiry on the relation between coopetitive rewards and high-quali...
Research on telework often focuses on the outcomes of telework, investigating if telework is ultimately a ‘good’ or a ‘bad’ thing for teleworkers and their organisations. However, findings across telework research studies are often inconclusive, requiring deeper engagement with potential explanations for contradictory and paradoxical results. This...
Despite the increasing popularity of telework, little is known about individual outcomes that arise particularly for teleworking professionals. We build on earlier research by examining the conceptual constructs of individual consequences from telework. We initially categorized consequences identified in the extant literature into five areas. Howev...
The multi-dimensional nature of user experience warrants rigorous assessment of the interactive experience in systems. User experience assessments are based on product evaluations and subsequent analysis of the collected data using quantitative and qualitative techniques. The quality of user experience assessments are dependent on the effectiveness...
The Australian government, to remind job seekers of appointments with employment services providers in order to cut costs and free up human resources, is using technologies such as Short Messaging Services (SMS). However, the technologies in-use are but one side of this equation the specifics of how these technologies are used is the other side, an...
Cultural institutions provide important benefits for society and for the visitors who come to them. Their staff need to understand how information technology can augment the visitor experience, and how to engage with their visitors to design programs that will meet visitors' expectations for greater interaction. Using an iterative, design science b...
Much crowdsourcing research has focused on behavioral and motivational aspects at the individual user level, but very few studies have examined the motivations of organizations for crowdsourcing. The limited extant research has examined managerial and technical factors influencing an organization’s decision to crowdsource, but they fail to take int...
Despite increasing investment by governments globally, citizens in some countries are less willing to engage with e-government innovations. While previous studies have examined what might encourage citizens to adopt e-government services more broadly, further research is required to understand those factors that impede or enable e government adopti...
Editorial for the Indigenous use of Information and Communication Technologies Section
Mobile technologies are deeply embedded in the daily lives of young people. The ubiquity, portability and functionality of these devices present new opportunities for enriching learning. Yet, to date there has been little theory development to guide the application of location-based technologies (LBT) in informal learning environments. To address t...
This paper contributes to an emerging discourse on the meaning of technology in today's networked society by exploring connectivity as a hallmark of the networked society. Based on an empirical study of professionals, arguably the forerunners of the networked society, the paper seeks to answer how connectivity matters. Rich narratives from in-depth...
Creating the conditions for sustainable economic growth within a constantly changing environment is a key concern for government and, as such, developing sustainable buildings is one of the key strategies. This research seeks an understanding of how improved stakeholder alignment impacts the use of information technology (IT) systems deployed in su...
Utilising the methodology of content analysis, this study uses a multidisciplinary approach to define public e-procurement. Various aspects of e-procurement have been discussed from information systems, supply chain management, electronic commerce/electronic government, and public procurement to come up with an integrated definition of public e-pro...
Engagement in work through information and communication technology from places other than a corporate office, often referred to as telework, is simultaneously transforming work and life. In order to support successful adoption of telework by organizations it is important to move away from re- search stacking up evidence for or against telework. In...
This research seeks to understand how improved stakeholder alignment impacts the use of IT systems deployed in support of sustainability. The IT alignment literature is dominated by a focus on strategy formulation within relatively simple organisation forms. In contrast, little is known about how stakeholder alignment is enacted to improve the use...
This paper describes research in progress which proposes an appropriation perspective to examine the iterative design, development and subsequent redesign of a cultural volunteer crowdsourcing application. The Technology Appropriation Cycle (TAC) model (Carroll 2004) assists with understanding the process of appropriation and describes how user's a...
Telework is the engagement in work outside of a regular office setting by means of the use of information and communication technology (ICT). Findings reported in the literature are mixed with some studies having argued that telework provides workers the opportunity to better balance work and private roles. In contrast others have argued telework b...
Harnessing value from Information Technology (IT) has long been a focus of research, but evidence is lacking about how effective practice of Information Technology Governance (ITG) contributes to creating value for stakeholders in inter-organisational contexts. This is especially so for public/private sector partnerships. In this study we used ISO/...
Information and communication technologies (ICT) have had, and continue to have, a profound impact on the way work is organized, undertaken and managed by organizations and their employees. Telework, in particular, allows employees to work anywhere and anytime. These developments are not simply extending earlier temporal and spatial boundaries of w...
The effectiveness of user experience design is dependent on many factors including complete and accurate contextual information, design approaches, and methods followed. The recent HCI literature clearly shows that there is a growing research interest on integration of User Experience (UX) design and agile software development. A framework based on...
Research that examines Information Technology (IT) value has called for studies to explore the co-creation of value, including in multi-firm environments. This study draws upon the practice of IT governance in a successful large-scale IT deployment, wherein private and public firms were involved as customer service providers with the principal, a l...
Internet discussion sites have become an enduring feature of modern asset markets. While prior research demonstrated a strong link between communicative practices and market behaviour, more work is required to fully understand the processes that support knowledge co-creation in these environments. To address this gap, we propose a research project...
Improved conceptual and methodological understanding of strategic alignment is essential for better IT outsourcing decisions. This research will investigate how strategically well aligned ITO investments can lead to improved performance and greater competitive advantage. The strategic alignment literature is dominated by a focus on strategy formula...
Crowdsourcing theory and research is in its infancy and fragmented with little theoretical agreement. This paper presents a conceptual framework that provides a holistic view of key influences on a non-profit GLAM (galleries, libraries, archives, museums) crowdsourcing initiative through an interpretive analysis. Three key themes of influences emer...
Despite the increasing popularity of crowdsourcing, there is a lack of empirical research on appropriate governance mechanisms, particularly in a non-profit context. The alignment of stakeholder motivations in non-profit crowdsourcing initiatives is often unique and challenging. A better understanding of crowdsourcing governance including relationa...
Crowdsourcing has gained popularity as a form of outsourcing. Outsourcing researchers have extensively studied the motivations to outsource IT, but very few have studied the motivations of organizations to crowdsourcing, in particular for GLAMs (galleries, libraries, archives, museums). GLAM institutions are increasingly adopting crowdsourcing tech...
This project examines the impact of IT project alignment mechanisms on the development of computer systems for the delivery of contracted government services in a complex public/private sector inter-organizational environment. Improved theoretical understanding of IT and business alignment in multi-firm environments is essential for the effective d...
This paper presents a qualitative analysis of an information systems design study within the context of agile software development based on conceptually different two design approaches: Current Agile Process (CAP) and Enhanced Agile Process (EAP). Eight agile software professionals and one user experience designer were recruited from the industry t...
Increased incidence of mental illness in Australia's indigenous youth is a major concern. Despite significant investment in programs to improve the situation, the absence of reliable and valid tools to assess the quality of mental health services is hindering progress. This project creates patterns that can be used to build better evaluation tools....
Maintaining the security of information systems and associated data resources is vital if an organization is to minimize losses. Access controls are the first line of defense in this process. The primary function of authentication controls is to ensure that only authorized users have access to information systems and electronic resources. Password-...
This survey paper categories, compares, and summaries from published technical and review articles in feature extraction methods in Electroence-phalography research and defines the feature, feature extraction, formalizes the relevance of the Electroencephalography data analysis in the health applications. Compared to all related reviews on feature...
Despite a considerable body of literature investigating factors involved in the Open Source Software (OSS) adoption process, there is little research into adoption of OSS by public sector organisations. So it was important to reassess the factors enabling OSS adoption in order to enhance OSS utilization within public sector organisations. This stud...
New technologies are increasingly relied upon to support innovative approaches to business education. In particular, Internet
technology has expanded the reach and range of traditional universities by allowing individualized online access to information
and knowledge. However, while there are many claimed pedagogical benefits, little is known about...
A growing body of literature indicates the crucial role of cooperative or competitive reward structures in determining information sharing behaviors, and in turn group performance. The real situations are, however, a mixture of cooperative and competitive- coopetitive- reward structures in different intensities and combinations. This study aims to...
Synthetic worlds provide potential for a new working environment. We provide a perspective on the future of work in a synthetic world; following a fictional robot trainer in the course of his work, experiencing the difficulties of programming an android to pass the Turing test. During his lunchtime break, our fictional worker plans a travel holiday...
Crowdsourcing in recent times has become popular among not-for-profits as a means of eliciting members of the public to contribute to activities that would normally have been carried out by staff or by contracting external expertise. The GLAM (galleries, libraries, archives, museums) sector does have a history of involving online volunteers (e.g. r...
Over the past decade, teaching and learning in virtual worlds has been at the forefront of many higher education institutions around the world. The DEHub Virtual Worlds Working Group (VWWG) consisting of Australian and New Zealand higher education academics was formed in 2009. These educators are investigating the role that virtual worlds play in t...
This paper reports results of an investigation into the use of Face book within government within the broader agenda of gaining an insight into the social media use by government. The use of Face book by the Australian Taxation Office (ATO) is presented as a case study of a poor example of Face book implementation by government. The case study exam...
Over the past decade, teaching and learning in virtual worlds has been at the forefront of many higher education institutions around the world. The DEHub Virtual Worlds Working Group (VWWG) consisting of Australian and New Zealand higher education academics was formed in 2009. These educators are investigating the role that virtual worlds play in t...
User Experience is a well recognized factor in design and evaluation of artifacts in Human-Computer Interaction. There are
many user experience models reported in the literature to reflect this status. Techniques and instruments for managing user
experience are still not sufficient. In this paper, we discuss design science research and important us...
Online communities have evolved beyond the realm of social phenomenon to become important knowledge-sharing media with real economic consequences. However, the sharing of knowledge and the communication of meaning through Internet technology presents many difficulties. This is particularly so for online finance forums where market-sensitive informa...
This study investigates the efficacy of using a restrictive password composition policy. The primary function of access controls is to restrict the use of information systems and other computer resources to authorised users only. Although more secure alternatives exist, password-based systems remain the predominant method of user authentication. Pr...
We offered a new perspective on communication in computer-mediated environments by examining communicative practices used during discussion in an online financial forum about a listed company that was experiencing abnormal trading behavior. The analysis of communicative practices showed how the linguistic nature of the online forum allowed covert m...
Despite a considerable body of literature on factors involved in the Open Source Software (OSS) adoption process, there is little research into concerns of OSS by public sector organisations. So it was important to reassess the factors inhibiting OSS adoption in order to enhance OSS utilization within public sector organisations. This study explore...
Over the past decade, teaching and learning in virtual worlds has been at the forefront of many higher education institutions around the world. The DEHub Virtual Worlds Working Group (VWWG) consisting of Australian and New Zealand higher education academics was formed in 2009. These educators are investigating the role that virtual worlds play in t...
The introduction of advanced capabilities in information and communication technology (ICT) has enabled organisations to support work activities and collaborate effectively between geographically separated workplaces. Through this usage, ICT has also enabled the introduction of new organisational structures and business process designs that offer p...
Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using password entropy as an indicator for password quality where lower entropy suggests a weaker or less secure password. However, a closer examination of this literature shows...
Elliptic curve cryptography (ECC) provides solid potential for wireless sensor network security due to its small key size and its high security strength. However, there is a need to reduce key calculation time to satisfy the full range of potential applications, in particular those involving wireless sensor networks (WSN). Scalar multiplication ope...
This paper highlights systemic contextual differences and the unique IT Governance issues that might arise in public and private sector organizations. Public sector organizations constitute a significant component of economic activity in most countries. Like their private sector counterparts, many public sector agencies are struggling to cope with...
Harnessing the power from Information Technology (IT) has been a focus of research and practice for many decades, yet statistics show that many organizations are yet to fully realize the value from investment in IT. Whilst numerous frameworks and standards have been published to help organizations achieve value from IT investment, research demonstr...
This research paper aims to understand the relative contribution levels of different knowledge factors to improvements in performance. A theoretical framework is developed that involves nine types of knowledge required for an individual to perform Software Engineering (SE) roles. Based on this, the research explores the contribution that additional...
This paper challenges traditional explorations of online communities that have relied upon assumptions of trust and social cohesion. In the analysis presented here, conflict becomes more than just dysfunctional communication and
provides an alternative set of unifying principles and rationales for understanding social interaction and identity shape...
In recent years, Design Science has gained wide recognition and acceptance as a formal research method in many disciplines
including information systems. Design Science research in Human-Computer Interaction is not so abundant. HCI is a discipline
primarily focusing on design, evaluation, and implementation where design plays the role as a process...
Universities are in the business of preparing students for their professional, social and
intellectual lives: as such they are also about producing the leaders and innovators for a
rapidly changing technological world. It is not entirely clear how well universities are
responding to these objectives particularly when it comes to embracing new techn...
In the complexity of competing study, work and social demands, university students face many challenges to their effective participation in, and engagement with, the university environment. The fragmentation of their time is often associated with a decreased on-campus presence. The Project's primary aim is to increase undergraduate and postgraduate...
Telework is a workplace arrangement in which employees have some degree of flexibility in work location and hours. The term 'Telework' was first coined in the 1970's to describe situations where information and communication technologies were used to support work activities undertaken away form the traditional office-based workplace. The subsequent...
Synthetic worlds provide potential for a new working environment. We provide a perspective on the future of work in a synthetic world; following a fictional robot trainer in the course of his work, experiencing the difficulties of programming an android to pass the Turing test. During his lunchtime break, our fictional worker plans a travel holiday...
The primary focus in design science research is the development of innovative and useful system artifacts. Apart from IT-centric artifacts such as software and hardware, design research outputs can also include constructs, models, methods and better theories. However, there is very little published research concerned with these alternative artifact...
Developments in information and communication technology (ICT) have enabled new organisational structures and business process designs that offer previously unavailable flexibility in when and where work is performed. ICT has facilitated the transportation of knowledge-based work between workers, colleagues, and firms. Despite the increasing popula...
This paper outlines an agenda for research that contributes to the development of sustainable virtual world ecosystems. It provides direction for understanding the social aspects of both trust and conflict. Trust is often referred to in research to examine the social interactions observed in virtual communities. It is an important theoretical facto...
Many systems rely on password composition rules to force users to choose more secure passwords. The findings discussed here are from a study on the enforcement of good password practice in the form of password composition rules. The results show that the enforcement of password composition rules does not discourage users from using meaningful infor...
Government agencies constitute a significant component of economic activity in most countries. Like their private sector counterparts, many public sector agencies are struggling to cope with reduced or inadequate IT budgets and are continuously looking for ways to extract maximum value from IT resources. While there are many similarities between pu...
Summary Password authentication is the most widely used authentication mechanism, and it will still be with us for many years yet to come. It is effective, simple, and accurate, with no extra cost. The strength of password authentication relies on the strength of the passwords. Good (or strong) passwords are essential for high level security. End u...
Telework is a workplace arrangement in which employees have some degree of flexibility in work location and hours. The term 'Telework' was first coined in the 1970's to describe situations where information and communication technologies were used to support work activities undertaken away form the traditional office-based workplace. The subsequent...
Control mechanisms established on the boundary of an information system are an important preliminary step to minimising losses from security breaches. The primary function of such controls is to restrict the use of information systems and resources to authorized users. Password-based systems remain the predominant method of user authentication desp...
This paper examines a specific online community and the degree to which participants' association is constituted and reinforced through conflict. We sample the existing literature regarding online communities in an historical sense and critique the preponderance among these writings to advocate trust and consensus. Our argument is that much of the...
Although videoconferencing technologies perform an important function in organizational com-munication, many users remain apprehensive about using the medium for routine communication. The study draws on media choice theory to assess the impact of communication apprehension and participation on perceptions of task characteristics and media traits....
The primary function of access controls is to restrict the use of information systems and other computer resources to authorised users only. Although more secure alternatives exist, password-based systems remain the predominant method of user authentication. Prior research shows that password security is often compromised by users who adopt inadequ...
Discussions in the literature about the digital divide have been concerned with the information divide, which it is argued could further increase the gap between developed and developing countries. Given this possibility, should developing countries change their policy focus to target their education resources towards specific areas that support re...
Maintaining the security of information systems and associated data resources is vital if an organisation is to minimise losses. Access controls are the first line of defence in this process. The primary function of access controls is to restrict the use of information systems and resources to authorised users. Password-based systems remain the pre...
Exploring the nature of linkages as a means of examining the potential for business collaboration within a Queensland region, this paper uses the existing business linkages as a means of analysing the potential of a region to foster greater collaboration amongst small and medium enterprises. Past research suggests that when firms within individual...
This paper reports the preliminary results of an exploratory survey of information technology usage by businesses located in regional Thailand. With growing concern about the digital divide, Thailand is an important and interesting region to study. There has been very little prior research that has examined the take-up of information technology in...
Many information systems (IS) investments belong to a class of capital budgeting problem where there is an option: the investment may be made straight away or delayed for some period. A real options analysis could allow decision-makers to add value to these investment decisions by providing a framework that explicitly recognises uncertainty. This p...
The Internet plays an important role in the dissemination of information about exchange-traded stocks. This information can come from a variety of sources including disclosures provided through an official company web site or the “rumors” and “tips” frequently posted on any one of the many Internet investment forums located around the world. The ra...
While there are several theoretical models that might explain the acceptance and usage of videoconferencing systems, little empirical research has been conducted to corroborate these theories and to establish which factors are important to videoconferencing participants. This study draws on the trait theories of media selection to assess the associ...
Communication technologies are becoming increasingly important in organizational communication. However, many users indicate that they are apprehensive about using these new mediums for routine communication. This study draws on media choice theory to assess the impact of communication apprehension and participation on perceptions of task character...
Although videoconferencing systems are increasingly becoming important in the support of geographically dispersed groups, there are few studies that identify the types of tasks that are most effectively performed within videoconferenced meetings. This study investigates the relationship between (a) technology quality and communication activity duri...
This paper reports on two pilot projects using blog and wiki technologies for assessment purposes in a large university-level introductory Information Systems subject. The paper describes the process of integrating social technologies for assessment purposes and provides a reflective account of the outcomes of the trials from both student and staff...
Acknowledgments: We acknowledge the support of CPA Australia who commissioned,and