[HTML][HTML] A systematic analysis of failures in protecting personal health data: a sco** review
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
Speculative foresight: A foray beyond digital transformation
As the discourse regarding digital transformation has developed, we see an opportunity to
extend the concept of becoming digital into an as‐of‐yet unrealized future. By examining the …
extend the concept of becoming digital into an as‐of‐yet unrealized future. By examining the …
Where is the “theory” within the field of educational technology research?
Critics often characterise the study of educational technology as under‐theorised. To test
this assertion and to determine the extent of this criticism, the present paper reports an in …
this assertion and to determine the extent of this criticism, the present paper reports an in …
[PDF][PDF] NEXT-GENERATION INFORMATION SYSTEMS THEORIZING: A CALL TO ACTION.
Theorizing is the intellectual engine of a scholarly community. With this special issue, we
hope to inspire the IS community to reaffirm its commitment to develo** foundational …
hope to inspire the IS community to reaffirm its commitment to develo** foundational …
Value co-creation in firm sponsored online communities: What enables, constrains, and shapes value
Purpose The purpose of this paper is to explore enablers and constraints in value co-
creation in sponsored online communities, and to identify firm roles in sha** value co …
creation in sponsored online communities, and to identify firm roles in sha** value co …
Approaching IT security & avoiding threats in the smart home context
Not securing smart home devices has proven a threat to cyberspace. This has underscored
the importance of using fear appeals to promote users' information security behavior. We …
the importance of using fear appeals to promote users' information security behavior. We …
Knowledge accumulation in design science research: ways to foster scientific progress
S Reining, F Ahlemann, B Mueller… - ACM SIGMIS Database …, 2022 - dl.acm.org
Design science research (DSR) is increasingly prominent in the information systems
discipline. However, despite a lively discourse, and methodical and conceptual advances …
discipline. However, despite a lively discourse, and methodical and conceptual advances …
From sovereign IT governance to liberal IT governmentality? A Foucauldian analogy
Changes in the technological and societal environments that surround organisations have
disrupted the classic governance frameworks that corporate and information technology (IT) …
disrupted the classic governance frameworks that corporate and information technology (IT) …
Conceptual framework of evaluation model on 4 C'S-based learning supervision
The 21st-century learning requires the implementation of 4 character skills, including (1)
Critical Thinking and Problem Solving,(2) Creativity and Innovation,(3) Collaboration, and …
Critical Thinking and Problem Solving,(2) Creativity and Innovation,(3) Collaboration, and …
[HTML][HTML] When it is part of me, I can do it: Using embodied empowerment to predict adherence to wearable self-care technology.
Despite assumptions that wearable self-care technologies such as smart wristbands and
smart watches help users to monitor and self-manage health in daily life, adherence rates …
smart watches help users to monitor and self-manage health in daily life, adherence rates …