About
70
Publications
50,203
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,094
Citations
Publications
Publications (70)
Being able to replicate scientific findings is crucial for scientific progress. We replicate 21 systematically selected experimental studies in the social sciences published in Nature and Science between 2010 and 2015. The replications follow analysis plans reviewed by the original authors and pre-registered prior to the replications. The replicati...
Being able to replicate scientific findings is crucial for scientific progress. We replicate 21 systematically selected experimental studies in the social sciences published in Nature and Science between 2010 and 2015. The replications follow analysis plans reviewed by the original authors and pre-registered prior to the replications. The replicati...
Research suggests that social engineering attacks pose a significant security risk, with social networking sites (SNSs) being the most common source of these attacks. Recent studies showed that social engineers could succeed even among those organizations that identify themselves as being aware of social engineering techniques. Although organizatio...
Despite actionable insight is widely recognized as the outcome of data analytics, there is a lack of a systematic and commonly-shared definition for the term. More importantly, existing definitions are generally too abstract for informing the design of data analytics systems. This study proposes a definition for actionable insight in data analytics...
Another social science looks at itself
Experimental economists have joined the reproducibility discussion by replicating selected published experiments from two top-tier journals in economics. Camerer et al. found that two-thirds of the 18 studies examined yielded replicable estimates of effect size and direction. This proportion is somewhat lower...
Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credi...
Despite actionable insight being widely recognized as the outcome of data analytics, there is a lack of a systematic and commonly-agreed definition for the term. More importantly, existing definitions are generally too abstract for informing the design of data analytics systems. This study proposes a definition of actionable insight as a multi-comp...
Phishing emails cause significant losses for organisations and victims. To fight back against phishing emails, victims’ detection behaviours must be identified and improved. Then, the impact of victims’ characteristics on their detection behaviours must be measured. Three methods, namely experiments, surveys and semi-structured interviews, were app...
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker...
This paper introduces a modified Kano approach to analysing and classifying quality attributes that drive student satisfaction in tertiary education. The approach provides several benefits over the traditional Kano approach. Firstly, it uses existing student evaluations of subjects in the educational institution instead of purpose-built surveys as...
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to...
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs) have been identified as some of the most common means of social engineering attacks. Due to factors that reduce users' ability to detect social engineering tricks and increase attackers' abilit...
Fault prediction models are typically built using software metrics collected throughout the software lifecycle process. Given without a previous release version of the software product, the earlier software metrics collected, the earlier the prediction models can be built to guide software verification and validation activities. In this experiment,...
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims’ defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitati...
IT Governance (ITG) continues to be a top priority for organizations, public and non-public. While the level of awareness towards ITG is evident, it is hardly manifested in practice. The purpose of this study is to elicit factors that act as barriers to the adoption of formal ITG practice. This qualitative study consists of 9 semi-structured interv...
This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture with focus on our scope: the fear of a lack of Interaction with other Humans. It will then...
This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture with focus on our scope: the need for Service Oriented Culture. It will then, briefly, des...
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people ha...
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to determine which individuals are more vulnerable to phishing emails. To gain this information an experiment has been developed which involves sending phishing email to users and collecting information about users. The detection deception model has bee...
Good management, supported by accurate, timely and reliable health information, is vital for increasing the effectiveness of Health Information Systems (HIS). When it comes to managing the under-resourced health systems of developing countries, information-based decision making is particularly important. This paper reports findings of a self-report...
This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used and present the questionnaire findings related to t...
This article illustrates an innovative method of administering stated choice studies (or vignette experiments) using computers and the Internet. The use of video clips to deliver information to research participants makes vignettes more realistic, helps to engage interest of research participants, and can reduce framing effects. The method also pro...
This paper reports the results of a mixed method approach to answer: what are the cultural values that impact on e-service use in Saudi Arabia? Cultural theories, dimensions, and models previously identified in the literature, in addition to individual interviews and focus groups, test the current identified uncovered elements of Saudi culture. Thi...
IT Governance (ITG) adoption remains a relevant topic of study. While extensive research has been done looking into the drivers and critical success factors of ITG practice, there seems to be a lack of interest in identifying the barriers to its adoption. This study reports on a survey conducted to first: provide some primary data that suggest ITG...
Managing service quality is of primary importance for organizations that are increasingly service
oriented, and offering a growing range of services to external and internal customers. Managing
service quality requires the capacity to measure service quality, concomitantly requiring explicit
conceptions of ‘service’ and ‘service quality’. This whit...
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ERP implementation costs, and upgrade costs as much as 25-33% of the initial ERP implementation. Still, the area of ERP maintenance and upgrade is relatively new and under...
Although the benefits of service orientation are prevalent in literature, a review, analysis, and evaluation of the 30 existing service analysis approaches presented in this paper have shown that a comprehensive approach to the identification and analysis of both business and supporting software services is missing. Based on this evaluation of exis...
The service-orientation paradigm has not only become prevalent in the software systems domain in recent years, but is also increasingly applied on the business level to restructure organisational capabilities. In this paper, we present the results of an extensive literature review of 30 approaches related to service identification and analysis for...
This paper explores the philosophical roots of appropriation within Marx's theories and socio-cultural studies in an attempt to seek common ground among existing theories of technology appropriation in IS research. Drawing on appropriation perspectives from Adaptive Structuration Theory, the Model of Technology Appropriation and the Structurational...
We empirically test the relative impact of general programming knowledge and application-specific knowledge on maintenance productivity. One hundred undergraduates participated in a quasi-experiment that required them to perform two maintenance tasks in sequence on an inventory control application. Each maintenance task involved a modification to t...
This paper re-conceptualizes 'information system success' as a formative, multidimensional index. A validated and widely accepted such index would facilitate cumulative research on the impacts of IS, while at the same time providing a benchmark for organizations to track their IS performance. The proposed IS-Impact measurement model represents the...
Services and service quality have become increasingly important competitive differentiators for firms, as well as contributors to national economies. Due to the relative uniqueness of each service, there is little consensus on the dimensions for service quality evaluation. The best known and most widely used of several instruments for measuring ser...
This paper explores the philosophical origins of appropriation of Information Systems (IS) using Marxian and other socio-cultural theory. It provides an in-depth examination of appropriation and its application in extant IS theory. We develop a three-tier model using Marx's foundational concepts and from this generate four propositions that we test...
The global downturn in demand for IT skills has not left Singapore unscathed. While the demand for information systems graduates has not been as adversely affected as that for traditional computer science ones, there appears to be a drop in the entry quality of students seeking to do information systems degrees. While there appears to be some turna...
The study looks at the application of preference programming approaches and techniques for decision support during prenegotiations over services. In hierarchical decision analysis models the need for multi-attribute evaluation techniques that may incorporate uncertainties directly in the modeling phase has resulted in the use of the 'interval' appr...
Recognizing that knowledge processes are social processes, and assuming that the theories considered within are commensurable, this paper proposes Giddens’ structuration theory as a basis for comparing knowledge management theories to identify common themes within the discipline. The discovery of common themes is a step toward the identification of...
Organisations invest enormous amount of resources in acquiring Enterprise Systems (ES), presumably expecting positive impacts to the organisation and its functions. Despite the optimistic motives, some ES projects have reported nil or detrimental impacts. This paper studies the proposition that the perspective of the stakeholders of an organisation...
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ERP implementation costs, and upgrade costs as much as 25-33% of the initial ERP implementation. Still, the area of ERP maintenance and upgrade is relatively new and under...
This paper presents a validated measurement model and instrument for assessing enterprise systems success from multiple perspectives. The final validated study model employs 27 measures of the four dimensions: information quality, system quality, individual impact, and organizational impact. The model is empirically tested with survey data gathered...
The business value of Enterprise Systems (ES), and in general large software implementations, has been extensively debated in both the popular press and in the academic literature for over three decades. Organizations have invested heavily in Enterprise Systems (and related infrastructure), presumably expecting positive outcomes to the organization...
The focus of this book is on the most important class of enterprise system, namely Enterprise Resource Planning (ERP) systems. Organisations typically take the decision to employ ERP systems in an attempt to streamline existing processes. Once these systems are in place, however, their success depends on the effectiveness of the implementation, and...
The business value of Enterprise Resource Planning (ERP) systems and in general large software implementations has been extensively debated in both popular press and academic literature for over three decades. Despite the positive motives for adoption, various organizations have reported negative impacts from these large investments. This 'disconne...
Through soft modeling of data collected from a survey of 83 Information Systems (IS) organizations in Singapore, this paper develops and tests a Partial Least Square (PLS) model that determines the impact of user knowledge, application quality, and maintenance control procedures on maintainer effectiveness. It was found that application quality has...
The worldwide installed base of enterprise resource planning (ERP) systems has increased rapidly over the past 10 years now comprising tens of thousands of installations in large- and medium-sized organizations and millions of licensed users. Similar to traditional information systems (IS), ERP systems must be maintained and upgraded. It is therefo...
Examination of barriers to benefits-realisation from Enterprise Systems (ES) has potential to provide an innovative perspective on strategic management of large-scale packaged software, and on the ex- tended virtual enterprise explicitly or implicitly deployed across the ES life-cycle. Private sector ex- perience has revealed distinctive conditions...
This paper seeks to stimulate research on large application package software maintenance by presenting a tentative framework for future research in the area, partially instantiating that framework with examples from the papers in this special issue of the Journal of Software Maintenance and Evolution, highlighting other specific areas of research n...
The worldwide installed base of Enterprise Resource Planning (ERP)
systems has increased rapidly in size over the past 10 years now
comprising tens of thousands of installations in large- and medium-sized
organizations and millions of licensed users. Similar to traditional
Information Systems (IS), ERP systems must be maintained and upgraded.
It is...
Research on the economics of software maintenance has concentrated
on software maintenance productivity. More often than not, maintenance
productivity is measured by the number of hours spent in servicing a
maintenance request. While this measure captures the cost of an
information systems (IS) department, it ignores a potential opportunity
cost to...
This paper reports the experiences of faculty in teaching about SAP R/3, teaching IS concepts using SAP R/3 and teaching post-graduate students how to research about implementation issues with ERP.
The effort required to service maintenance requests on a software
system increases as the software system ages and deteriorates. Thus, it
may be economical to replace an aged software system with a freshly
written one to contain the escalating cost of maintenance. We develop a
normative model of software maintenance and replacement effort that
enab...
Currently, there are only two detailed theories of cognition: ACT* and its successor PUPS (Anderson, 1983; Anderson, 1989) and SOAR (Laird, Newell, & Rosenbloom, 1987). These theories of cognition only account for learning from a procedural chunking point of view. They exclude other aspects of cognition such as episodic memory and declarative chunk...
Standards are consensus-based documents that codify best practices. The use of standards (such as IEEE/EIA 12207, a maintenance model) is noted to assure that software projects are successfully completed on time, within budget and with the intended benefits. However, available standards for software maintenance model are mainly meant for in-house c...
This paper reports in-progress research on factors driving software and maintenance sour- cing decisions. It proposes that software and maintenance sourcing decisions are interre- lated, and that these decisions, while driven primarily by economic factors posited by Trans- action Cost Theory, are moderated by psychological and sociological factors...
This paper reports preliminary results from a three-round, non-anonymous Delphi-type survey of 23 government agencies within the Queensland State Government (QSG). The survey examined issues associated with the introduction of the SAP R/3 within that government. Our analysis employs a holistic, interpretive and inductive approach towards understand...
Through soft modeling of data collected from a survey of 83 Information Systems (IS) organizations in Singapore, this paper develops and tests a Partial Least Square (PLS) model that determines the impact of user knowledge, application quality, and maintenance control procedures on maintainer effectiveness. It was found that application quality has...
This paper illustrates an innovative method of administering fractional factorial surveys (vignettes) using the internet. The approach makes it possible to use video clips to deliver information. The method also provides subjects with interactive options before making judgments. A study to determine the views of older people regarding residential o...
Despite the optimistic motives, many Enterprise Systems projects have reported nil or detrimental impacts. Understanding the dimensionality of ES success, the theoretical considerations and the development of a standardized instrument to gauge the level of success are critical in ES evaluations. In an attempt to increase the validity of conclusions...
Organisations invest substantial resources in Enterprise Systems (ES) expecting positive outcomes for the organisation and its functions. Yet, many ES projects have reported nil or detrimental impacts. The effective management of ES-related knowledge has been suggested as a critical success factor for these ES projects. This paper analyses the impa...
Research on the impact of Information Systems (IS) reported in both academic literature and popular press has reported confounding results. Some studies have reported encouraging results of IS, while others have reported nil or detrimental results. The contradictory results of these research studies can be partially attributed to the weaknesses in...
Organisations invest enormous sums of money in acquiring Enterprise Resource Planning (ERP) systems, presumably expecting positive impacts to the organisation and its functions. Despite the optimistic motives some ERP projects have reported nil or detrimental impacts. This paper studies the proposition that the size of an organisation (e.g. small,...
Two distinct maintenance-data-models are studied: a government Enterprise Resource Planning (ERP) maintenance-data-model, and the Software Engineering Industries (SEI) maintenance-data-model. The objective is to: (i) determine whether the SEI maintenance-data-model is sufficient in the context of ERP (by comparing with an ERP case), (ii) identify w...
This paper presents an exploratory study of the appropriation of information systems (AIS) in anaesthesia. Using a grounded theory approach, we identify three key concepts and the basic social process of appropriation to construct a theoretical model that explains why certain systems are chosen, what technologies are considered and how they are app...