Journal of Systems and Information Technology: Volume 18 Issue 1


Table of contents

Perception deception: security risks created by optimistic perceptions

Richard G. Taylor, Jeff Brice, Jr., Sammie L. Robinson

The purpose of the paper is to determine whether management’s optimistic perceptions of their organization’s level of information security preparedness can ultimately result in…

Bridging the edtech evidence gap: A realist evaluation framework refined for complex technology initiatives

There are five factors acting as a barrier to the effective evaluation of educational technology (edtech), which are as follows: premature timing, inappropriate techniques, rapid…


Achieving adoption and effective usage of Web 2.0 among employees within Australian government organizations

Mohd Heikal Husin, Nina Evans, Gaye Deegan

Ensuring effective usage of Web 2.0 within government organisations is not as straightforward as it seems. The organisations should be aware of a number of issues when…

A six-stage framework for evolutionary IS research using path models: Conceptual development and a social networking illustration

Ned Kock, Murad Moqbel

The purpose of this study is to fill a gap in evolutionary theorizing in the field of information systems. Evolutionary theorizing has recently been added as a useful tool to the…


Understanding Twitter as an e-WOM

Umesh Rao Hodeghatta, Sangeeta Sahney

This paper aims to research as to how Twitter is influential as an electronic word-of-mouth (e-WOM) communication tool and thereby affecting movie market. In present days, social…

Cover of Journal of Systems and Information Technology



Online date, start – end:


Copyright Holder:

Emerald Publishing Limited

Open Access:



  • Dr Raymond Chiong