Forthcoming articles


International Journal of Information Systems and Management


These articles have been peer-reviewed and accepted for publication in IJISAM, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJISAM are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Information Systems and Management (2 papers in press)


Regular Issues


  • The Growing Impact of Shadow IT on Higher Education   Order a copy of this article
    by Owen Hall Jr. 
    Abstract: The problems associated with Shadow IT (SIT) continue to grow throughout higher education. Some of the challenges include cybersecurity concerns, noncompliance with regulatory requirements, and end user-built applications that are not coded to institutional standards. In todays digital economy, end users have an expanding number of IT options and recent data suggest that these end users are increasingly using SIT in support of their work and school assignments. The results of a survey based on the ground theory model identified a number of categories that help explain the dynamics between end users and central IT. A causal loop model was then applied to the task of resolving these qualitative-based conflicts, paving the way for developing of an amelioration plan. The purpose of this article is to introduce the Hybrid-driven IT model, which is designed to establish the most appropriate level of SIT that optimizes overall institutional IT performance.
    Keywords: Shadow IT; higher education; hybrid-driven IT model; grounded theory; causal loop diagrams; online learning.

  • Evaluating Consumer Food Safety Mobile Applications: Lessons Learned from Combining Assessment of Users, Usability & Context   Order a copy of this article
    by Adeola Bamgboje-Ayodele, Leonie Ellis, Paul Turner 
    Abstract: Numerous consumer food safety mobile applications (apps) are aimed at mitigating health risks arising from poor lifestyle, nutrition and domestic food poisoning due to unsafe food handling. There is limited research evaluating the effectiveness of these apps in mitigating specific health risks; and how consumers adopt and use these apps. The few existing evaluations have marginalised questions about the importance of contexts of use and the attributes and behaviours of end-users. This paper describes an over-arching evaluation approach to address these issues. The approach adapted a heuristics framework and combined it with a consumer-based evaluation (CBE) to holistically assess the usability of these apps, their contexts of use and the attributes of end-users. The paper further presents detailed research findings, generated from the CBE of three food safety mobile apps, which is the focus of this paper. This CBE was conducted through scenario-based focus groups session with nine Australian consumers using card sorts. The results identify three application design considerations recommended to enhance apps that provide consumers with safe food handling information. This is part of a broader research focused on improving understanding of how best to enhance consumer food safety and mitigate health risks associated with unsafe food handling.
    Keywords: Usability; Heuristics Evaluation; Consumer Evaluation; Food Safety; Mobile Applications.