background

2020 Conf-IRM Papers Abstracts

Download Conference Papers Here
P01

A Framework for IoT-based Products and Services Value Proposition
Graziela Molling, Amarolinda Klein

The Internet of Things (IoT) has the potential to help firms to innovate and to address new business opportunities. However, many companies face difficulties in developing value propositions for products and services based on this technology. Considering this, we aimed to answer the following research question: which elements need to be considered to develop value propositions for IoT-based products and services? We used the Design Science Research (DSR) method to answer this question through the creation and testing of a specific framework to support the development of this type of value proposition. The framework was evaluated by 31 academic experts and practitioners and applied to two real businesses. It considers critical elements related to the value proposition and the relations between the main architecture layers of the IoT (including capabilities and challenges), the different types of values that can be generated for different actors, as well as the strategic positioning of IoT-based products and services.

P02

A Utility Theory Model for Individual Adoption of Bitcoin
Pouyan Esmaeilzadeh, Hemang Subramanian, Karlene Cousins

In recent years, the growth of cryptocurrency prices, notably that of Bitcoin has garnered mainstream news coverage. However, very little is known about the factors that motivate an individual to adopt Bitcoin, though studies abound in the blockchain technology adoption and its use in various domains such as healthcare, supply chain, and finance. In the current paper, we argue that the existing, widely-used IT adoption models may not completely explain the reasons (i.e., benefits, barriers, and specific factors) associated with the adoption of cryptocurrencies. We propose a research model based on UTAUT and utility theory to discover the perceived benefits, perceived risks, facilitating conditions, and social effects in the individual adoption of Bitcoin.

P03

Achieving Organizational Agility through Application Programming Interfaces: The Effect of Dynamic Capability and Institutional Forces
Joshua Ofoeda, Richard Boateng, John Effah

Digital platforms have contributed enormously to the success of businesses. Whereas the Information Systems literature is dominated by digital platform research, less is mentioned about Application Programming Interfaces (APIs), the fibre that connects digital platforms. Critically, the normative literature seems to be silent on how developing economy firms achieve agility through API integration. In addressing these research gaps, this research seeks first to investigate how developing economy firms achieve agility when they integrate APIs. Furthermore, the study aims to understand which forms of institutional forces enable or hinder the API integration process. Philosophically, this study will be approached from a critical realist perspective and will adopt a qualitative method of inquiry.

P04

Big data evaluation scorecard
Anthony Koomson, Richard Boateng, Eric Afful-Dadzie, Acheampong Owusu

This study seeks to examine the evolution of issues that have been espoused by both junior and senior scholars to aggregate out of literature, a criterion that can guide firms in evaluating their Big data analytic (BDA) projects. The systematic review approach took stock of varied socio-technical understanding, requirements, and capabilities used in addressing Big data issues and synthesized these issues for value accruals.

The study strongly argues that Big data benefits accrue to firms whose economic activities require distributed collaborative effort, operational visibilities, cost, and time-sensitive decisions who adopt and implement the concept in their strategic, tactical, and operational levels. Though the trend shows steady growth in scholars' interests and expectations in BDA, a significant percentage of the reviewed studies were not informed by any theory. The study contributes to BDA literature by affording scholars issue gaps and for practitioners, an analytical competency and evaluation scorecard that links strategic business goals to operational outcomes.

P05

Cocriação no desenvolvimento de sistemas de informação: O caso do software de gestão de processos eletrônicos de uma universidade federal brasileira
Adrianne Andrade, Anatália Ramos

O desenvolvimento de sistemas de informação (SI) é um processo complexo que frequentemente está associado a falhas, inconsistências ou deficiências. Para lidar com essa complexidade, novas abordagens têm sido estudadas, como a cocriação, um fenômeno pautado em interações e experiências entre consumidores e organizações. Apesar da relevância desse conhecimento, há relativamente poucos estudos relacionando os temas da cocriação e da gestão de SI, especificamente no campo do desenvolvimento de software. Para endereçar esta lacuna, foi feita uma pesquisa de estudo de caso que investigou o processo de cocriação no desenvolvimento de um software de gestão de processos eletrônicos em uma universidade federal brasileira. O estudo de caso identificou canais, práticas favoráveis, características e métodos de cocriação aplicados em um contexto de desenvolvimento de software de uma universidade federal que podem ser adotadas por outras organizações públicas congêneres.

P06

Communities of Practice: Role of Shared Vision, Shared Goals and Accountability as Knowledge Transfer Enablers
Oluwatosin Araba, Kevin Gallagher

Knowledge is increasingly important to the effectiveness of organizations, as most can be categorized today as being knowledge-based, at least to some degree. Transfer of knowledge, thereby, is a critical challenge. The purpose of this paper is to explore the antecedents and relationship between variables that can enable knowledge transfer within the context of communities of practice in an organization. Communities of practice are often employed in organizations, with varying levels of success, to capture and share information relevant to the community. This paper looks at the interactions between a shared vision, shared goals, and accountability, and their potential for increasing knowledge transfer. This paper takes a systems perspective and integrates the theory of social learning and goal-setting theory of motivation to develop a model that explores and hopes to predict greater knowledge transfer. Contributions to theory and practical implications are discussed.

P07

Could Cyber-conflict be Avoided? Exploring Deterrence in Low and High Stakes Information Security Interactions
Carlos Parra, Hemang Subramanian, Suresh Malladi

This study explores deterrence, using bargaining games, in information security interactions under two scenarios: first, considering low stakes (corporate and intermediary) information security disclosure platforms; and second, considering a direct high stakes interaction between heavyweight actors. Low stakes results indicate that conflict may be avoided and deterrence advanced by engaging in trade, albeit under exacting circumstances. Now, when stakes are high, and heavyweight actors are involved, derivations and simulations showcase how it is even more difficult to avoid conflict and advance deterrence. We also illustrate using real world scenarios and explain the relevance of Black-Market Brokers.

P08

Cyberhate: Profiling of Potential Targets
Malcolm Garbutt, Jacques Ophoff, Manqola Tshidi

Cyberhate is defined as hatred expressed in online environments directed at groups and individuals based on their race, religious belief, ethnic origin, sexual orientation, or gender. Cyberhate is a growing phenomenon, as it coincides with increased access to the Internet. This paper explores cyberhate awareness, observations, and experiences to present a profile of cyberhate victims using the Routine Activities Theory. Providing such a profile can raise awareness of at-risk targets and provide opportunities for intervention. A survey of 183 students at a large university provided insight into online user experiences. The research revealed links between awareness, observations, and experiences of cyberhate on various online platforms. While awareness of cyberhate was associated with frequent Internet and social media access, reported experiences of cyberhate were lower than anticipated. Males experienced higher levels of cyberhate in online games and news sites. Likewise, older students experienced higher levels of cyberhate on news sites, as did respondents with higher education levels who also experienced a higher level of cyberhate on chat sites. Daily users of social media experienced higher levels of cyberhate on such platforms. An interesting finding was a correlation between frequent online gaming and lower levels of empathy for victims. The findings show the complexity of defining a profile for cyberhate targets.

P09

Designing Social Networking Mobile App for Diabetes Management
Md Rakibul Hoque, Wahiduzzaman Khan , Mohammad Zahedul Alam, Golam Sorwar, Md Hasan

The knowledge required for diabetes prevention and management among the rural people in developing countries vastly remains in the state of non-existence. To address this, a diabetic knowledge sharing platform, as an effective means for diabetes prevention, control, and treatment, can play role in increasing diabetes awareness and literacy. Currently researchers have emphasized the scope of peer-led learning by knowledge sharing on social media platforms in healthcare context. Therefore, by identifying this scope, we have prototyped a mobile app integrated with social media features to enable diabetic patients for cost-effective peer-led learning, knowledge sharing, and awareness building. In this process, we resorted to follow the cycles and guidelines as proposed in the Information System Research (ISR) framework for identifying users' needs and preferences as well as building the theoretical foundation for the design of an app. This study demonstrates that the users had positive response and well acceptance to this prototype app as a medium for peer-led for diabetes management. Based on the findings, the researchers are optimistic about the potentiality of the app for a wider scale adoption by diabetic patients as a cost-effective peer-led learning platform.

P10

Digital entrepreneurship and institutional changes: Fintechs in the Brazilian mobile payment system
Gabriel M Braido, Amarolinda Klein

In mature and highly regulated markets, digital entrepreneurship may demand institutional changes to flourish. This paper aims to analyze institutional changes associated with the entry of new digital entrepreneurs (fintechs) into a national payment system. To achieve this goal, we conducted a case study in the Brazilian mobile payment system, with data collected from multiple sources, such as interviews with fintech entrepreneurs, document analysis, a survey with 580 users and non-users of mobile payments, and participant observations during a fintech summit. The Institutional Theory supported the understanding of institutional changes regarding the regulatory, normative, and cultural/cognitive pillars of the mobile payment system needed to support the new entrants (fintechs). The institutional work performed to carry on these changes is also analyzed.

P11

Digital-by-Default: Exclusion through Digital Public Service Channel
Javiera Fernanda Medina Macaya, André Francisco Alves, João Porto de Albuquerque, Maria Alexandra Cunha

The use of digital channels has been promoted by governments as a way of improving services and reducing costs. This article aims to discuss how new forms of exclusion can be created by policies based on a digital-by-default orientation. To this end, more than 1.2 million service records are analyzed, as well as being considered socioeconomic indicators and spatial characteristics of the city of São Paulo. Results show that there is a statistically significant correlation between income and digital channels usage, as well as between digital channels usage and the requested service attendance time. It is also verified that the districts of the central region of the city tend to have high income, high rates of human development and high digital channels usage, while the periphery's districts tend to have low income, lower rates of human development and high traditional channels usage. It is concluded that, by prioritizing digital service channels, new forms of social exclusion are being created and that a portion of the population may be "forgotten" by the government.

P12

Elementos que afetam o desenvolvimento de Fintechs de Pagamentos Móveis: um estudo de caso no Contexto Brasileiro
Gabriel M Braido, Amarolinda Klein, Guilherme Papaléo

As fintechs têm criado uma nova realidade financeira global, provendo acesso a serviços que antes se concentravam nos bancos. Este artigo visa identificar facilitadores e barreiras enfrentadas pelas fintechs de pagamentos móveis para operarem em um país em desenvolvimento (Brasil). O método de pesquisa foi um estudo de caso único, cuja unidade de análise foi o segmento de fintechs de pagamentos móveis no contexto brasileiro, envolvendo nove empresas desse setor. Como resultados, identificou-se que diversos fatores atuam como facilitadores ao ingresso e desenvolvimento das fintechs, tais como: conveniência e foco da solução oferecida, inovação no uso da tecnologia e colaboração e parcerias entre fintechs. Porém, diversas barreiras são enfrentadas no surgimento e desenvolvimento dessas empresas, tais como: questões regulatórias, necessidades de investimentos, dificuldades de encontrar parceiros e conflitos de interesse com grandes players do mercado financeiro.

P13

Enterprise System Implementation: A Multimodal Approach to Social Network Knowledge Transfer
Sharath Sasidharan, Bethany Niese

Organizations have struggled to provide adequate system-related knowledge support to end users during enterprise system implementation. Prior research has examined the influence of system-related knowledge sourced from end users within workplace social networks on implementation outcomes. Drawing upon the actor-network theory, this study extends the social network to include knowledge sourced from three institutionally mandated entities, the shared inbox, help desk, and service desk. This multimodal approach provides a comprehensive view of knowledge flows across the organization as opposed to a partial view confined to end user interactions. In addition, knowledge sourced from institutionally mandated entities will be of higher quality than that acquired through informal end user interactions, and can have a significant impact on implementation outcomes. This paper conceptualizes the shared inbox, help desk, and service desk as nodes within the network. Preliminary analysis is now being conducted on data collected from end users in the post-implementation phase of an Enterprise Resource Planning (ERP) system. The results of this study could provide additional insights into the impact of knowledge acquired from end users in comparison to knowledge sourced from support structures. Organizations could strategically allocate resources among support structures depending on its relevance to their operational context.

P15

Growing in the Digital Economy: The Case of a Digital Enterprise in a Developing Country
Eric Ansong, Richard Boateng

Africa has a higher business discontinuation rate of 13 percent when compared with that of Europe and the USA. This situation calls for a study that explores the strategic actions and growth of digital enterprises which are able to survive within the African context. Again, studies on Digital Business Strategy (DBS) which is a multidimensional concept focus on digital enterprises with formalised structures. Against this background, using a comprehensive DBS framework, this study explored the DBS evolution of a digital enterprise in a developing economy in the quest to survive and grow. Miles and Huberman's transcendental realism technique was adopted for the case analysis. Three major growth events were identified in the case. The digital business strategic actions of the enterprise were reviewed for each of the phases of growth. It was discovered that the survival of the digital enterprise, in the first stage of growth, depends largely on the entrepreneur's innovativeness, and the competence to govern the available resources to achieve competitive advantage. This research is arguably the first to explore the growth and survival of a digital enterprise using a multidimensional DBS framework. Lessons from the study are of practical importance to managers and executives of digital enterprises who are struggling to develop digital business strategic actions to survive and grow. This study is useful for entrepreneurs who wish to develop DBS to survive and thrive in the digital economy of an African country.

P17

Identificando as Competências Informacionais e o Potencial das TIC no âmbito da vulnerabilidade social: um estudo em Associação de Material Reciclável no Brasil
Ana Carolina Silva, Taiane Ritta Coelho, Marcia Cassitas Hino

Estima-se que, no Brasil, apenas 13% de todo o resíduo passível de reaproveitamento seja encaminhado para reciclagem, demonstrando um desperdício significativo de material, de potencial econômico e ambiental. O cenário é agravado pelo baixo nível de eficácia das associações de catadores de material reciclável no país. Verifica-se a necessidade de identificar as competências informacionais presentes neste ambiente e de compreender como capacidades de TIC podem melhorar a eficiência organizacional das associações de catadores de material reciclado. Um estudo de caso único embasa a pesquisa, cuja escolha da associação se deu pela sua relevância na inserção social e financeira de famílias da região e pela sua localização em um bairro de grande vulnerabilidade social e marginalização. Identificou-se que as capacidades de gestão do negócio são as mais desenvolvidas, seguidas pelas capacidades de gestão da informação. As capacidades que demandam maior atenção são as relacionadas à tecnologia da informação. A pesquisa aponta a importância da tecnologia e da informação como suporte ao desenvolvimento de processos da cadeia da reciclagem, avança nas discussões sobre contribuições de TICs em organizações com condições de trabalho de vulnerabilidade social e contribui para o desenvolvimento das pessoas que trabalham com a gestão de materiais recicláveis.

P18

Impact of Security Awareness on Smartphone Security
Annette Mills, Yilun Huang, Xuan (Jade) Chen, Haolin Ding and Xiaohui Li

Smartphones are among the most ubiquitous and indispensable of today's ICTs, with personal devices being used to support both business and personal life, and store and convey the most sensitive and valuable of information. Their protection is therefore important and highly dependent on what people do. Yet many do little to protect their devices. Why this is so, is not clear. Therefore this study seeks to investigate what motivates people to protect their devices. Using Protection Motivation Theory (PMT), this paper introduces a model of the impacts of threat and coping appraisal on smartphone security, and of threat and countermeasure awareness in informing these appraisals. The findings of the model tests are reported, and implications for practice and further research presented.

P19

Innovation Capabilities and the role of Strategic Intelligence
Fernanda M. Reichert, Raquel Janissek-Muniz, Mariana Heinze, Amanda S. Cainelli, Paulo A. Zawislak

In rapidly changing environments, innovation allows firms to maintain their market competitiveness. A firm with well-developed innovation capabilities stands a better chance to sustain its competitiveness. Additionally, strategic intelligence practices will also contribute to positive results, as a firm's economic sustainability depends on installed processes to obtain informational elements coming from the external environment to support its decision-making process. In this way, innovation often benefits from intelligence processes, especially when it provides new knowledge, monitors technological trajectories, and expands understanding of the external environment. To survive in a competitive market a firm needs innovation capabilities and strategic intelligence practices, but how are they related? Firms that are proactive in terms of their strategic intelligence practices have more developed innovation capabilities when compared to those reactive ones? This study aims to identify whether firms with activities associated with the strategic intelligence process differ in terms of their innovation capability level, verifying differences when comparing reactive and proactive groups. We analyzed secondary data of 1,331 Brazilian manufacturing firms. From the analysis, we have identified that development, operations and management capabilities are higher in those firms where there are strategic intelligence practices in place.

P20

Integrando gerenciamento energético e bem-estar animal utilizando aprendizado de máquina e visão computacional
Leonardo Santiago Benitez Pereira, Rafael Rodrigues, Olli Koskela, Iivari Kunttu, Joni Kukkamäki, Edison A. C. Aranha

Electricity plays an important part in production costs, but there is a scarcity of systems that consider the production chain as a whole and express all relevant performance indices. This work initiates the integration of two currently independent management systems: PGEN project (from Federal Institute of Santa Catarina, Brazil), focused on energy management of public buildings, and Barn 4.0 project (from Häme University of Applied Sciences, Finland), focused on Animal Welfare Management in the dairy industry. The main results of those two projects are briefly presented, including a system of cows' behavioral activity recognition (interactions, agglomerations, among 8 other classes) using Computer Vision, and a predictive system of electrical consumption using an ensemble of 6 Machine Learning models. We elaborated a conceptual framework of an Integrated Production Management System, also pointing out important directions for future research and the possibilities of applying this system to other industries.

P21

IT Assimilation: Conceptualization and Measurement
Lakshmi Goel, Steven Williamson, Justin Zhang

This study examines a new construct-IT Assimilation-that is pertinent to the discourse on information security. We define IT Assimilation as the incorporation of enterprise IT into an individual's IT repertoire, and then use a multi-phase methodological approach to develop and test our construct. Our findings provide valuable insights about transferring IT behaviors and potential takeaways for researchers and practitioners in cybersecurity.

P22

Manipulation of Online Reviews: Analysis of Negative Reviews for Healthcare Providers
Sojen Pradhan, Elina Amatya, Yijun Ma

There is a growing reliance on online reviews in today's digital world. As the influence of online reviews amplified in the competitive marketplace, so did the manipulation of reviews and evolution of fake reviews on these platforms. Like other consumer-oriented businesses, the healthcare industry has also succumbed to this phenomenon. However, health issues are much more personal, sensitive, complicated in nature requiring knowledge of medical terminologies and often coupled with myriad of interdependencies. In this study, we collated the literature on manipulation of online reviews, identified the gaps and proposed an approach, including validation of negative reviews of the 500 doctors from three different states: New York and Arizona in USA and New South Wales in Australia from the RateMDs website. The reviews of doctors was collected, which includes both numerical star ratings (1-low to 5-high) and textual feedback/comments. Compared to other existing research, this study will analyse the textual feedback which corresponds to the clinical quality of doctors (helpfulness and knowledge criteria) rather than process quality experiences. Our study will explore pathways to validate the negative reviews for platform provider and rank the doctors accordingly to minimise the risks in healthcare.

P23

Mobile Money and Financial Inclusion for the Unbanked - A Choice Analysis
Malcolm Garbutt, Pitso Tsibolane, Batloung Hlabeli

This study explored the impact of mobile money on financial inclusion and development from Kleine's Choice perspective in the lives of entrepreneurs of a least developed country (LDC). A thematic analysis of data gathered from in-depth semi-structured interviews of twenty-three micro and small enterprise entrepreneurs based in Lesotho's capital city Maseru suggested a variety of primary outcomes that result when the entrepreneurs exercise their choice to use mobile money technology. These include achieving a higher quality of life through increased revenue and profits due to the transactional convenience, financial management capabilities and improved access to banking services (financial inclusion) provided by the mobile money technology. For the entrepreneurs to achieve these primary outcomes, a choice must exist and be accompanied by an awareness of the available choices that can be made. Furthermore, the entrepreneurs must possess the agency to make a choice and actively make a choice before an outcome can be achieved. Mobile money is not without limitations such as withdrawal limits, network failures and safety issues which limit the entrepreneurs' agency to exercise choice. This study proposes a practical model based on Kleine's Choice Framework for assessing development that is based on a rich and contextualised understanding of choice, agency and structure.

P24

Open Government Data Initiatives: Open by Default or Publishing with Purpose
Novy N.R.A. Mokobombang, Jairo A Gutierrez, Krassie Petrova

Over the last decade, after a set of Open Government Data (OGD) principles were developed, governments around the world started to radically change their culture on data governance. However, at the implementation stage of OGD initiatives governments needed to consider whether publishing the massive quantities of open datasets did meet public needs for use and re-use, in view of the enormous investment and resources put into the production of publishable OGD. This research-in-progress adopts an exploratory case study approach combining it with a narrative literature review to investigate how the "Open by default" principle and the "Publishing with purpose" strategy were involved in facilitating OGD usage and public participation. The study's goal is to overview the current implementation of OGD initiatives and to explore best practices when working with open data. We expect to present a new logic model or to show the modification of existing government organisational logic models by analysing the findings on the nature of the New Zealand government effort in opening data up relates with the possible advantage experienced by the government and the public at large.

P25

Problems Associated with Older Adults' Adoption of Robo Advisors: An Empirical Study
Shangjun Wang

In the recent years, Robo Advisor, a digital platform that provides automated, algorithm-driven financial planning services, has increasingly received attention from users of different demographics. Many users have taken advantage of its features to automate their saving and investing activities. However, users in an older age group, specifically, those aged fifty or above, have been seen with low adoption of the robo-advisory services. This empirical study is designed to explore the problems associated with older adults' adoption of robo advisors. Specifically, this study intends to examine whether mental health of aging adults affects their intention to use robo advisors. In addition, I hypothesize that perceived usefulness may mediate the effect of mental health on behavioral intention towards using robo advisors, such that it serves to explain why various levels of mental health would result in differences in intention to use (i.e. approach or avoid robo advisors). To explore solutions for non-adoption, I identify three external variables (i.e. social influences, accessibility, and learning support) that could possibly moderate the main effects of mental health hypothesized in the study, so that when either of these variables is present and strengthened, it will enhance likelihood of using robo advisors.

P26

Self-Serving Bias in Machine learning and artificial intelligence Systems: A Case of Phishing Website Detection System
Yan Chen

Intelligent systems built on machine learning (ML) and artificial intelligence (AI) have enabled a wide range of applications with capabilities and functions far exceeding those of human beings. When human beings and intelligent systems jointly make decisions and complete tasks, human beings make a cognitive assessment on the capability of the intelligent system. A biased assessment could lead to devastating consequences in system use. In this study, we develop a research model to examine the self-serving bias toward intelligent systems and the sources of the bias in the context of intelligent phishing website detection system. Our model suggests that the capability of the intelligent system in terms of detection accuracy is one key factor contributing to the self-serving bias in personal capability. The task difficulty, outcome value of decision, and social loafing are other factors influencing the bias. On the other hand, personal traits and illusion of control are two major sources for self-serving bias toward the intelligent system.

P27

Solutions to Increase Mobile Merchant Payment Applications Value, Customers' Continued Intention to Use, and Loyalty
Karlene Cousins, Pouyan Esmaeilzadeh, Shangjun Wang

The use of mobile payment applications is on the rise. There are a variety of mobile payment applications that attempt to offer value to increase the market share of merchants that provide them. However, many users are likely to stop using apps if optimal utility and customized services are not correctly delivered. This study proposes that offering context-based services that indicate customization and personalization of services will improve the perceived utility of mobile merchant payment applications and in turn, increase continued intention to use it and customer loyalty to the merchant. Our results also show that the reputation of mobile vendors significantly enhances the perceived utility of mobile merchant payment applications. The findings of this study can be valuable to researcher, merchants and mobile application developers.

P28

Tailoring the Cyber Security Framework: How to Overcome the Complexities of Secure Live Virtual Machine Migration in Cloud Computing
Hanif Deylami, Jairo A Gutierrez, Roopak Sinha

This paper proposes a novel secure live virtual machine migration framework by using a virtual trusted platform module instance to improve the integrity of the migration process from one virtual machine to another on the same platform. The proposed framework, called Kororā, is designed and developed on a public infrastructure-as-a-service cloud-computing environment and runs concurrently on the same hardware components (Input/Output, Central Processing Unit, Memory) and the same hypervisor (Xen); however, a combination of parameters needs to be evaluated before implementing Kororā. The implementation of Kororā is not practically feasible in traditional distributed computing environments. It requires fixed resources with high-performance capabilities, connected through a high-speed, reliable network. The following research objectives were determined to identify the integrity features of live virtual machine migration in the cloud system:

  • To understand the security issues associated with cloud computing, virtual trusted platform modules, virtualization, live virtual machine migration, and hypervisors;
  • To identify the requirements for the proposed framework, including those related to live VM migration among different hypervisors;
  • To design and validate the model, processes, and architectural features of the proposed framework;
  • To propose and implement an end-to-end security architectural blueprint for cloud environments, providing an integrated view of protection mechanisms, and then to validate the proposed framework to improve the integrity of live VM migration.

This is followed by a comprehensive review of the evaluation system architecture and the proposed framework state machine. The overarching aim of this paper, therefore, is to present a detailed analysis of the cloud computing security problem, from the perspective of cloud architectures and the cloud service delivery models. Based on this analysis, this study derives a detailed specification of the cloud live virtual machine migration integrity problem and key features that should be covered by the proposed framework.

P30

Use of Network Analysis Technique for Prioritizing Project Portfolio: A Case Study
Greta Carenine Paes Amorim Araújo Jiupato, Claudio Luis Carvalho Larieira , Eduardo de Rezende Francisco

Network analysis is widely used in the context of exploring social phenomena that involve disciplines such as economics, marketing and psychology. This work proposes the use of network analysis from an optics perspective as a strategic analytical intelligence tool, where it discusses its use as a support tool when prioritizing project portfolios. The research was defined through a case study carried out in a Brazilian bank, in which a specific scenario of the need to prioritize demands within the existing portfolio was considered, covering the period from 2018 to the first quarter of 2019. To study these scenarios, 2-mode networks were analyzed to visualize the context and measures of centrality degree, proximity and intermediation were also used to provide analytical intelligence in identifying the best options for negotiation and prioritization. It was concluded, through the information provided by the use of network analysis, that complex scenarios and difficulties for prioritization can be predictively diagnosed, as well as the centrality measures allow the identification of the best options for prioritization and selection and the view of the impacted areas to be involved in the negotiation. The use of network analysis technique as a support tool for decision making in the prioritization of projects portfolio is very promising and becomes potential as a new efficient option to be considered, evaluating its ability to provide analytical intelligence and insights predictive of the prioritization scenarios.

P31

The Effect of e-Filing on Tax Compliance among Micro Enterprises in Jamaica
Genee Tracey, Steven Rob, Lisandra Bartley, Delroy Chevers

Over the past decades government revenue authorities, especially in developing countries have implemented a series of reforms towards strengthening their revenue collection capabilities. Electronic filing (e-Filing) of taxes was introduced in Jamaica to improve tax compliance. However, the adoption of this initiative remains low which results in loss of tax revenue. This condition ultimately limits the government's ability to finance needed projects and address critical needs of citizens. This study seeks to investigate the effect of e-Filing on tax compliance among micro enterprises in Jamaica. Tax-compliant firms found the e-Filing system easy to use and cost effective, while the non-compliant firms did not adopt this initiative because it was felt that paying taxes was not a priority at this stage of the firm. It is hoped that the insights gained from this study can guide government policy makers regarding the introduction of information and communication technology (ICT) in tax administration.

P32

Who Should I Approach? Knowledge Sourcing in Enterprise System Implementation
Sharath Sasidharan, Bethany Niese

During enterprise system implementation, organizations transfer system-related knowledge to end users through training sessions and by having them involved in the system design and implementation processes. However, during actual use of the system, end users acquire informal knowledge from co-workers through their social networks. Existing research has focused on the structural features of social networks and their impact on regulating knowledge flow between end users and across the network. The personal attributes and preferences of end users that could impact their knowledge acquisition and processing capabilities have not been considered. This paper examines the expertise level of end users, their gender, and the complexity of their job tasks in influencing system-related knowledge acquisition and its impact on performance outcomes. Data for this study was collected from active users of a new Enterprise Resource Planning (ERP) system that had been implemented across multiple business units of diversified business conglomerate in the United States.

P33

Using Knowledge Management to Strengthen Information Security Policy Development in Developing Countries: Case – Jamaica
Nadine Barrett Maitland, Kweku-Muata Osei-Bryson, Gunjan Mansingh

Information security incidents continue to grow exponentially amidst the development of advanced technological solutions aimed at protecting information system resources. Today, the growth in information systems' breaches remains at an alarming rate. The strategies developed by malicious users are becoming more sophisticated in nature and are introduced unabated across various networks. However, security experts and developers are lagging behind in their response to the information security phenomenon. Today, developing countries continue struggling to effectively address information security issues and are becoming the main avenue for cyber criminals who capitalize on the weaknesses that exist in these regions. An effective response to information security requires a significant amount of resources. In developing countries there are limited human, financial and technological resources and weak legislative frameworks and these are fundamental requirements for combating cyber-crime. One major cyber-crime incident could be catastrophic for businesses and governments in these small, fragile economies and could have far reaching effects on their citizens. Knowledge management can be employed to assist in strengthening the capability of organizations and governments in the development of context-sensitive information security policies in developing regions. In this paper we present a knowledge acquisition model that brings together the two most widely adopted standards COBIT, ISO/IEC 27005 and tacit knowledge that exists in repositories (human) within the information security domain to support the development of context-sensitive information security policies. A quantitative methodology was used in the development of an artifact, preliminary evaluation was done using the informed argument approach and results and recommendations for future research are presented. This study can add to the limited literature on the use of knowledge management in the information security domain and the artifact presented can assist information security practitioners in small/medium-sized organizations.