Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 431

Full-Text Articles in Entire DC Network

Proceedings - Enabling Excellence Through Equity Conference 2019, Pranit Anand, Kylie Austin, Jacinta Mcnamara, Jenna Thorn, Kimberley Twist Nov 2019

Proceedings - Enabling Excellence Through Equity Conference 2019, Pranit Anand, Kylie Austin, Jacinta Mcnamara, Jenna Thorn, Kimberley Twist

Enabling Excellence through Equity conference 2019

Proceedings of the Enabling Excellence through Equity EPHEA & NAEEA conference, University of Wollongong, 24-27 November 2019, 103p. [Conference information, programme and abstracts]


Approches De La Pluralité Du Français Parlé À Maurice : Vers Quelles Convergences Des Pratiques D’Usage Et D’Enseignement ?, Priscille Ahtoy Sep 2018

Approches De La Pluralité Du Français Parlé À Maurice : Vers Quelles Convergences Des Pratiques D’Usage Et D’Enseignement ?, Priscille Ahtoy

Mauritius 50: 'Hand in Hand?' Research Day

Citation: Priscille Ahtoy, Approches de la pluralité du français parlé à Maurice : Vers quelles convergences des pratiques d’usage et d’enseignement?, Lame dan lame? La main dans la main? Hand in Hand? Conference, University of Mauritius and University of Wollongong, 2019.

Abstract: Quel français parle-t-on à l’ile Maurice ? Cette terre anciennement colonisée par des Français au XVIIIe siècle et qui depuis, a accueilli des personnes de différentes cultures et de différents continents regorge à présent de mots et d’expressions propres à l’île. L’anglais, le français, le créole, le bhojpouri et d’autres langues asiatiques se mélangent pour constituer ce vocabulaire …


Chinese Languages Spoken In Mauritius: An Overview, Julie Lefort Sep 2018

Chinese Languages Spoken In Mauritius: An Overview, Julie Lefort

Mauritius 50: 'Hand in Hand?' Research Day

Citation: Julie Lefort, Chinese Languages spoken in Mauritius: An Overview, Lame dan lame? La main dans la main? Hand in Hand? Conference, University of Mauritius and University of Wollongong, 2019.

Abstract: Up to now, studies on the Chinese community of Mauritius have mainly focused on Chinese immigration and settlement from a historical point of view and little attention has been given to Chinese languages and linguistic practices involving Chinese languages. Although different varieties of Chinese are spoken in Mauritius, namely Hakka, Hokkien, Cantonese, and to some extent, Standard Mandarin, the few studies on Chinese languages of Mauritius have focused on …


Langues, Éducation Et Discrimination Dans La République De Maurice, Guilhem Florigny Sep 2018

Langues, Éducation Et Discrimination Dans La République De Maurice, Guilhem Florigny

Mauritius 50: 'Hand in Hand?' Research Day

Citation: Guilhem Florigny, Langues, éducation et discrimination dans la République de Maurice, Lame dan lame? La main dans la main? Hand in Hand? Conference, University of Mauritius and University of Wollongong, 2019.

Abstract: The Republic of Mauritius, independent for half a century today, is seen as a country where respect for the majority and diversity of its multicultural society prevails. Nevertheless, these past thirty years have seen numerous conflicts taking the form of inter-community tensions, denunciation of “malaise creole” by Father Roger Cerveaux in 1994, death of Creole singer Kaya in 1999, Truth and Justice Commission in 2009. A report …


Attitudes Towards Languages In Mauritius With Particular Reference To Kreol In Education: Preliminary Results, Anu Bissoonauth-Bedford Sep 2018

Attitudes Towards Languages In Mauritius With Particular Reference To Kreol In Education: Preliminary Results, Anu Bissoonauth-Bedford

Mauritius 50: 'Hand in Hand?' Research Day

Citation: Anu Bissonauth-Bedford, Attitudes towards languages in Mauritius with particular reference to Kreol in education: preliminary results, Lame dan lame? La main dans la main? Hand in Hand? Conference, University of Mauritius and University of Wollongong, 2019.

Abstract: This paper investigates patterns of language use and language attitudes of young Mauritians in education with special emphasis on Kreol, taught since 2012 in primary education and from 2018 in secondary schools. The first section gives a brief overview of the current language situation. The second presents the fieldwork methodology used to collect data in schools in August-September 2018. The data is …


La Politique Linguistique De La France : Paradoxe Et Réalité Un Moyen D’Appréhender La Situation Linguistique À Maurice? [France's Language Policy : Paradox And Reality - A Way To Understand The Language Situation In Mauritius], Henri A. Jeanjean Sep 2018

La Politique Linguistique De La France : Paradoxe Et Réalité Un Moyen D’Appréhender La Situation Linguistique À Maurice? [France's Language Policy : Paradox And Reality - A Way To Understand The Language Situation In Mauritius], Henri A. Jeanjean

Mauritius 50: 'Hand in Hand?' Research Day

Citation: Henri A. Jeanjean, La politique linguistique de la France : Paradoxe et Réalité Un moyen d’appréhender la situation linguistique à Maurice?, Lame dan lame? La main dans la main? Hand in Hand? Conference, University of Mauritius and University of Wollongong, 2019.

Abstract: The successive policies of French governments have always been consistent when it comes to promoting French language and culture. Since the establishment of the ordinance of Villers-Cotterêts in 1539 until the speech of Emmanuel Macron at the Institut de France on March 20, 2018, not to mention the French Revolution in 1789 and the Toubon law in …


Epistemological Marginalization And Research In Language Sciences: Confessions Of An Anarchist, Shameen Oozerally Sep 2018

Epistemological Marginalization And Research In Language Sciences: Confessions Of An Anarchist, Shameen Oozerally

Mauritius 50: 'Hand in Hand?' Research Day

Citation: Shameen Oozerally, Epistemological marginalization and research in language sciences: confessions of an anarchist, Lame dan lame? La main dans la main? Hand in Hand? Conference, University of Mauritius and University of Wollongong, 2019.

Abstract: Tensions between institutional discourse around ‘innovation’ and the realities intrinsic to research which aims to be innovative can have a direct impact on how the academic constructs his/her identity as a researcher. ‘Innovative research’ implies a certain level of epistemological and methodological rethinking, which does not necessarily sit well with established and conventionalized, and to some extent, ‘secure’ research practices. Venturing outside these epistemological, theoretical, …


Lame Dan Lame? La Main Dans La Main? Hand In Hand? Introduction, Anu Bissoonauth-Bedford, Kumari Issur Sep 2018

Lame Dan Lame? La Main Dans La Main? Hand In Hand? Introduction, Anu Bissoonauth-Bedford, Kumari Issur

Mauritius 50: 'Hand in Hand?' Research Day

Anu Bissonauth-Bedford and Kumari Issur, Introduction, Lame dan lame? La main dans la main? Hand in Hand? Conference, University of Mauritius and University of Wollongong, 2019.

The articles in this special issue of Research Online publication titled ‘Lame dan lame? La main dans la main? Hand in Hand?’ are drawn from presentations at the colloquium held at the University of Mauritius (UoM) on 13 September 2018. The colloquium itself was organised following discussions about the need to focus on the theme of lame dan lame adopted by the Mauritian government to mark its fifty years of independence from British rule …


Key Challenges For Establishing Cio Position In The Public Sector Of Ldcs: A Case Of Bangladesh, Bashir Hussain, Ahmed Imran, Tim Turner Dec 2016

Key Challenges For Establishing Cio Position In The Public Sector Of Ldcs: A Case Of Bangladesh, Bashir Hussain, Ahmed Imran, Tim Turner

27th Australasian Conference on Information Systems

Abstract: Unprecedented growth of information and communications technology (ICT), calls for new public management, pressure from donors, citizen demand, and, above all, the government’s “Digital Bangladesh” political pledge provide impetus for integrating ICT in the public sector of Bangladesh. Despite efforts, the country cannot make sufficient progress in ICT due to the lack of IT structure led by a chief information officer (CIO) or similar leadership position. Although the literature describes various aspects of CIO including role effectiveness, competencies and structural relationship, it does not offer any prescriptive measure on how the CIO position should be established. Drawing on institutional …


It’S Only Pixels, Badges, And Stars: On The Economic Value Of Reputation On Airbnb, Timm Teubner, Norman Saade, Florian Kawlitschek, Christof Weinhardt Dec 2016

It’S Only Pixels, Badges, And Stars: On The Economic Value Of Reputation On Airbnb, Timm Teubner, Norman Saade, Florian Kawlitschek, Christof Weinhardt

27th Australasian Conference on Information Systems

Abstract: Trust is a crucial prerequisite for peer-to-peer rental and sharing. Therefore, platform operators such as Airbnb have implemented a host of trust-building mechanisms, user interface (UI) artefacts, and reputation systems. While the role of reputation systems for establishing trust is well-understood, little is known about how reputation actually translates into tangible economic value. In this paper, we thus consider the economic value of trust artefacts on Airbnb by quantifying price effects of common reputation features from a signalling theory perspective. Our analysis is based on a large-scale dataset from 86 German cities and hedonic price modelling. We find that …


Assessing Student Engagement In Cross Campus Work In Learning: A Teaching Case In Corporate Network Management, William Tibben, Shanmuga Sundram Dec 2016

Assessing Student Engagement In Cross Campus Work In Learning: A Teaching Case In Corporate Network Management, William Tibben, Shanmuga Sundram

27th Australasian Conference on Information Systems

Abstract: Work integrated learning (WIL) activities aim to improve future employability of graduates. Increasing internationalisation of information technology professions suggests the need for cross cultural experiences to be included within WIL in Information Systems subjects. The paper reports on one such WIL activity carried out in cross campus group work exercise between students in Australia and Malaysia undertaking a Bachelor of Information Technology (BIT) degree at the University of Wollongong and partner institution INTI International College, Subang, Malaysia. The focus of the paper is on student engagement to ascertain whether students perceive value in this kind of learning activity. It …


Optimising Visual Layout For Training And Learning Technologies, Bruce Hillard, Jocelyn Amarego, Tanya Mcgill Dec 2016

Optimising Visual Layout For Training And Learning Technologies, Bruce Hillard, Jocelyn Amarego, Tanya Mcgill

27th Australasian Conference on Information Systems

Abstract: The layout and arraying of information in electronic aids used for training can affect viewer comprehension and impressions. This paper explains existing layout guidance, and defines an integrated design model for applying these recommendations. To test the efficacy of this model, experiments were conducted under Murdoch University Human Research Ethics Committee (HREC) approval 2010/012. In these experiments two similar presentations were created, which contained the same content. However, one of these presentations applied the integrated design model to shape the positioning of the visual content, and a variant was developed that flipped the layout, so it did not conform …


Understanding The Internet Pitchfork Mob: Internal Revolutionary Activity In Self-Regulated Online Communities, Catherine Olivia Mcrae, Jean-Gregoire Bernard, Jocelyn Cranefield Dec 2016

Understanding The Internet Pitchfork Mob: Internal Revolutionary Activity In Self-Regulated Online Communities, Catherine Olivia Mcrae, Jean-Gregoire Bernard, Jocelyn Cranefield

27th Australasian Conference on Information Systems

Abstract: Research into organised online protest typically focuses on how digital activism empowers social movements. But what if an online community is rebelling against its platform owners? This study seeks to identify the trajectory of internally focused revolutionary activity in self-regulated online communities. Based on an analysis of three cases (Reddit, 2015; Mozilla, 2014, and Skyrim, 2015) it identifies six stages of revolution: incident, reaction, mobilization, action, negotiation, and a return to ‘normality’ with a new power equilibrium. For each stage, key events, relations between the community and platform managers, and the ways in which power is enacted through online …


An Information Systems Perspective On Digital Currencies: A Systematic Literature Review, Osemwonyemwen Oshodin, Alemayehu Molla, Chin Eang Ong Dec 2016

An Information Systems Perspective On Digital Currencies: A Systematic Literature Review, Osemwonyemwen Oshodin, Alemayehu Molla, Chin Eang Ong

27th Australasian Conference on Information Systems

Abstract: Digital currency (DC) is gaining public and research attention as an alternative paradigm of currency, its value, and exchange. Because of the growing DC research in the Information Systems (IS) domain, it is necessary to appraise existing DC research coverage and identify areas for future exploration. This article offers an up to date review of IS research on digital currencies. It synthesises the locus and focus of issues, theories, methods, and findings and provides direction for future research. The study uses a systematic literature review method to examine IS articles published between 2010 and 2016. The review identified twenty …


Analysing Trust Issues In Cloud Identity Environments, Brian Cusack, Eghbal Ghazizadeh Dec 2016

Analysing Trust Issues In Cloud Identity Environments, Brian Cusack, Eghbal Ghazizadeh

27th Australasian Conference on Information Systems

Abstract: Trust acts as a facilitator for decision making in environments, where decisions are subject to risk and uncertainty. Security is one of the factors contributing to the trust model that is a requirement for service users. In this paper we ask, What can be done to improve end user trust in choosing a cloud identity provider? Security and privacy are central issues in a cloud identity environment and it is the end user who determines the amount of trust they have in any identity system. This paper is an in-depth literature survey that evaluates identity service delivery in a …


Facebook Usage During A Flood – A Content Analysis Of Two Local Governments’ Facebook Pages, Monika Magnusson Dec 2016

Facebook Usage During A Flood – A Content Analysis Of Two Local Governments’ Facebook Pages, Monika Magnusson

27th Australasian Conference on Information Systems

Abstract: During a disaster it is vital that government agencies provide timely and accurate information to the public. Lately, social media such as Facebook have become important channels for crisis communica-tion. The purpose of this study is to identify the types of usage and topics in which users of a local gov-ernments’ Facebook page engage, during a flood. A content analysis was carried out on two local gov-ernments’ Facebook pages during two floods in 2013; The Bundaberg Regional Council’s (BRC) and the City of Calgary’s (CC). The results show that Facebook is an important channel for spreading in-formation. Users’ engagement …


Course Design Principles To Support The Learning Of Complex Information Infrastructures, Corina Raduescu, Jenny Leonard, Catherine Hardy Dec 2016

Course Design Principles To Support The Learning Of Complex Information Infrastructures, Corina Raduescu, Jenny Leonard, Catherine Hardy

27th Australasian Conference on Information Systems

Abstract: This paper presents an integrated, learning-centred course design for studying the complex, rapidly changing information infrastructures underpinning organisations and society. Students need to develop an agile, critical mindset in order to influence and be influenced by these socio-technical systems in ways which enhance information management, control and innovation. There are several challenges to developing this mindset. Students and technology vendors often expect technical training and current educational materials reinforce this approach. A silo-based structure to most degrees exacerbates the problem. The complexity of context and rapidity of change often get lost in the mix. This paper addresses these problems …


Ict And Public Service Value Creation In Africa: Efficiency Assessment Using Dea Approach, Lucas Mimbi, Felix Olu Bankole Dec 2016

Ict And Public Service Value Creation In Africa: Efficiency Assessment Using Dea Approach, Lucas Mimbi, Felix Olu Bankole

27th Australasian Conference on Information Systems

Abstract: Recently, researchers and international bodies have recognised the potential of ICT in public service value creation. Many countries have implemented ICT to transform public services and create public value. Citizens are increasingly demanding public value from the governments, the notion similar to return on investment from private sectors. However, little research has been conducted on ICT and public value creation. Using Data Envelopment Analysis and Cluster Analysis, data for 53 African countries were analysed. The findings indicate that for a period from 2005 to 2014, ICT has efficiently transformed public values in Africa by 5, 18, and 40 percent …


Ict And Public Service Value Creation In Africa: Efficiency Assessment Using Dea Approach, Lucas Mimbi, Felix Olu Bankile Dec 2016

Ict And Public Service Value Creation In Africa: Efficiency Assessment Using Dea Approach, Lucas Mimbi, Felix Olu Bankile

27th Australasian Conference on Information Systems

Abstract Recently, researchers and international bodies have recognised the potential of ICT in public service value creation. Many countries have implemented ICT to transform public services and create public value. Citizens are increasingly demanding public value from the governments, the notion similar to return on investment from private sectors. However, little research has been conducted on ICT and public value creation. Using Data Envelopment Analysis and Cluster Analysis, data for 53 African countries were analysed. The findings indicate that for a period from 2005 to 2014, ICT has efficiently transformed public values in Africa by 5, 18, and 40 percent …


Who Influences Information Security Behaviours Of Young Home Computer Users In Vietnam? An Ego-Centric Network Analysis Approach, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno Dec 2016

Who Influences Information Security Behaviours Of Young Home Computer Users In Vietnam? An Ego-Centric Network Analysis Approach, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno

27th Australasian Conference on Information Systems

Abstract: This study aims to explore the social roles of the people who can influence young home computer users (HCUs) in Vietnam, as well as the interactions that make those people influential. Since HCUs are considered the weakest link in the security chain and cyber-threats can attack organisation’s information systems indirectly via these HCUs, it is therefore necessary to identify their sources of security influence for designing effective intervention. To this end, the ego-centric network analysis approach was employed to analyse the personal networks of security influence of 116 HCUs, comprising 548 influential sources in total. Close relationships such as …


Heinz Semanek's Almost Forgotten Contribution To The Early Philosophy Of Informatics, Stefan Gruner Dec 2016

Heinz Semanek's Almost Forgotten Contribution To The Early Philosophy Of Informatics, Stefan Gruner

27th Australasian Conference on Information Systems

This paper recapitulates some of the most important thoughts and aspects of the early and almost forgotten compuer- and informatics-philosophy by the Austrian computer pioneer Heinz Zemanek (1920-2014).


Self-Disclosure On Facebook: Comparing Two Research Organisations, Kathryn Parsons, Dragana Calic, Carlos Barca Dec 2016

Self-Disclosure On Facebook: Comparing Two Research Organisations, Kathryn Parsons, Dragana Calic, Carlos Barca

27th Australasian Conference on Information Systems

Abstract This study investigated why employees self-disclose on Facebook, and whether there is a difference in self-disclosure between employees of an Australian government organisation and an academic institution. We employed quantitative and qualitative approaches, including an online questionnaire of 216 participants and ten interviews. The two organisations were compared on organisational variables, and measures of Privacy Concerns, Privacy Behaviour and Propensity to Trust as potential predictors of self-disclosure. Privacy Behaviour and Propensity to Trust were significant predictors for the government organisation, whereas demographic and organisational factors were the main predictors for the academic institution. Furthermore, qualitative findings revealed that, whilst …


Managing Inherent Conflicts In Agile Distributed Development: Evidence From Product Development, Ashay Saxena, Shankar Venkatagiri, Rajendra K. Bandi Dec 2016

Managing Inherent Conflicts In Agile Distributed Development: Evidence From Product Development, Ashay Saxena, Shankar Venkatagiri, Rajendra K. Bandi

27th Australasian Conference on Information Systems

Abstract: Increasingly, software is being developed following agile approaches in a distributed setup. An agile setting is typically characterized by flexibility, in order to accommodate changing customer demands for continuous delivery of business value. A distributed setting brings about multiple demands for stability, in terms of a push for clear specification of requirements and design, and a big picture product definition. Therefore, implementing agile distributed development projects results in an inherent conflict that must be reconciled. We conducted two case studies of such projects in the domain of product development to examine the nature of conflict as well as the …


Customising Agent Based Analysis Towards Analysis Of Disaster Management Knowledge, Dedi Iskandar Inan, Ghassan Beydoun, Simon Opper Dec 2016

Customising Agent Based Analysis Towards Analysis Of Disaster Management Knowledge, Dedi Iskandar Inan, Ghassan Beydoun, Simon Opper

27th Australasian Conference on Information Systems

Abstract: In developed countries such as Australia, for recurring disasters (e.g. floods), there are dedicated document repositories of Disaster Management Plans (DISPLANs), and supporting doctrine and processes that are used to prepare organisations and communities for disasters. They are maintained on an ongoing cyclical basis and form a key information source for community education, engagement and awareness programme in the preparation for and mitigation of disasters. DISPLANS, generally in semi-structured text document format, are then accessed and activated during the response and recovery to incidents to coordinate emergency service and community safety actions. However, accessing the appropriate plan and the …


Mitigating Byod Information Security Risks, Daniel Alejandro Arregui, Sean B. Maynard, Atif Ahmad Dec 2016

Mitigating Byod Information Security Risks, Daniel Alejandro Arregui, Sean B. Maynard, Atif Ahmad

27th Australasian Conference on Information Systems

Abstract: Organisations that allow employees to Bring Your Own Device (BYOD) in the workplace trade off the convenience of allowing employees to use their own device against higher risks to the confidentiality, integrity, and availability of organisational information assets. While BYOD is a well-defined and accepted trend in some organisations, there is little research on how policies can address the information security risks posed by BYOD. This paper reviews the extant literature and develops a comprehensive list of information security risks that are associated with allowing BYOD in organisations. This list is then used to evaluate five BYOD policy documents …


Design In Complex Environments: Application In Emergency Management, I. T. Hawryszkiewycz Dec 2016

Design In Complex Environments: Application In Emergency Management, I. T. Hawryszkiewycz

27th Australasian Conference on Information Systems

Abstract: This paper describes ways to identify issues in complex environments using emergency response and recovery as an example. Emergency response and recovery is recognized as a complex problem. The complexity is the result of the number of entities involved and the frequently changing relationships between them. The paper describes a systematic way based on design thinking to analyze systems in complex environments and identify design issues to be addressed. It then shows how such issues can be used to develop joint value propositions that lead to conceptual solutions. The systematic design process begins by identifying manageable themes. It then …


Socially-Constructed Metrics For Agile Quality: An Action-Research Study, Sharon Coyle, Joao Barata Dec 2016

Socially-Constructed Metrics For Agile Quality: An Action-Research Study, Sharon Coyle, Joao Barata

27th Australasian Conference on Information Systems

Abstract: We present a method to develop socially-constructed metrics for ascertaining agile software development quality. Canonical action research (CAR) is our mode of inquiry, conducted in a key European player of healthcare information systems. The result is a set of meaningful metrics that are built according to three interrelated dimensions: (1) evidence from practice; (2) stakeholders’ expectations; and (3) stakeholders’ evaluation. Our contribution suggests simple artifacts to create socially-constructed metrics and the main guidelines for applying them. Agile teams struggle with quality measurement, often supported by a plethora of metrics that do not adhere to rapidly changing project environments. We …


Measuring Is Success Of E-Government: A Case Study On The Disability Sector In Australia, Gary Sterrenberg Dec 2016

Measuring Is Success Of E-Government: A Case Study On The Disability Sector In Australia, Gary Sterrenberg

27th Australasian Conference on Information Systems

Abstract: Despite unprecedented investments in e-government annually, the degree to which these initiatives are successful in delivering government outcomes varies widely. It is posited that traditional means of evaluating these systems overlook important measures needed to support the ultimate success of e-government. To address this gap, this study will: (1) identify the critical features of e-government that influence success; (2) investigate how public value is created through the use of e-government; and (3) propose and test a public value based success model to explain the creation of value within the disability sector. This study extends the DeLone and McLean IS …


A Conceptual Model For The Application Of Business Analytics In The Horizontal Strategic Alliance, John Janosko, Tingru Cui, Sim Kim Lau Dec 2016

A Conceptual Model For The Application Of Business Analytics In The Horizontal Strategic Alliance, John Janosko, Tingru Cui, Sim Kim Lau

27th Australasian Conference on Information Systems

Abstract: The formation of strategic alliances amongst organisations has grown in recent years as globalisation has opened new markets for firms to pursue. It is of ever-increasing importance that organisations have a thorough understanding of the performance of their alliance to achieve competitive advantage. However, much research on strategic alliance has focused on examining the organisations within the alliance rather than focusing on the alliance itself. Using the new discipline of business analytics, this paper proposes a hierarchical model blending the functional roles of business analytics with data standardisation and context mediation frameworks to allow business analytics to be applied …


The Multidimensionality Of It Outsourcing Risks, Anna Zaitsev, Kenneth J. Stevens, Deborah Bunker Dec 2016

The Multidimensionality Of It Outsourcing Risks, Anna Zaitsev, Kenneth J. Stevens, Deborah Bunker

27th Australasian Conference on Information Systems

Abstract: IT outsourcing is a complex endeavour with multiple sources of risks. The body of knowledge on the subject is vast but scattered. Our project aims to create an integrated risk and controls framework. This paper discusses the multidimensional nature of outsourcing risks that needs to be addressed when such framework is developed. This paper presents findings from two workshops where risks, their classifications and dimensions where discussed by a group of experienced risk practitioners. The results highlight that practitioners see strategy, stakeholders and the different phases of the outsourcing as important dimensions that create risk and need to be …