Forthcoming articles


International Journal of Information Systems and Management


These articles have been peer-reviewed and accepted for publication in IJISAM, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJISAM are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Information Systems and Management (5 papers in press)


Regular Issues


  • The Impact of the Role and Communication of Staff on Successful Outsourcing of Information Systems Projects   Order a copy of this article
    by Mohamad Hisyam Selamat, Mohd Amir Mat Samsudin, Ram Al-Jaffri Saad, Muhammad Syahir Abdul Wahab 
    Abstract: This study investigates the impact of the role (project scope, authority and responsibility fulfillment) and communication (formal and informal discussion and rational discourse) of staff on the successful outsourcing of information systems (IS) projects. A total of 500 questionnaires were distributed by post to the managers of IS outsourcing firms registered with the Multimedia Super Corridor Malaysia and 168 questionnaires were returned. Multiple regression was used to analyze the hypotheses. The results highlight that project scope, responsibility fulfillment, formal and informal discussions and rational discourse have a significantly positive relationship with the success of outsourcing IS projects. Implicit in this finding is that there is a need to closely monitor individual and information technology (IT) elements of IS projects to ensure its successful outsourcing.
    Keywords: Information systems outsourcing success; role; communication.

  • A fuzzy decision support system for pre-disaster budgeting   Order a copy of this article
    by Terry Rakes, Jason Deane, Loren Rees, David Goldberg, Josey Chacko 
    Abstract: Estimating the potential loss from a disaster can be a difficult task due to the great uncertainty plus a lack of historical data. An integer programming budgeting system is developed for pre-disaster planning and mitigation funding where the loss parameters of the decision model are fuzzy numbers based on expert opinion. It allows for two options for representing the fuzzy numbers: the element with the highest grade of membership (the loss level that the expert feels about most strongly) and the element corresponding to the fuzzy average value at risk (AVaR) (a loss level with minimal support, but devastating consequences). A plan based on weighted preferences provides a compromise, using mitigation strategies based on maximum membership and strategies based on AVaR. Comparisons are made to illustrate how the budgeting model could be used to determine the best combination of strategies and weights for allocating mitigation dollars to balance overall risk.
    Keywords: fuzzy numbers; decision support system; disaster budgeting; integer programming; average value at risk; mitigation strategies; weighted preferences; black swans.

  • Does Adoption of Cloud Computing Matter? The Economic Worth of Cloud Computing Implementation   Order a copy of this article
    by M. Adam Mahmood, Laura Trevino, Aurelia Nicholas-Donald 
    Abstract: The present research investigates the impact of cloud computing adoption on the market value of a firm using an event study and firm performance measures. Using a resource based view, the efficient market hypothesis was used to analyze a sample of 136 companies that adopted cloud computing and are listed in one of the US stock exchanges, it is found that cloud computing announcements are associated with negative market returns but these returns are not statically significant. The trading volume and the risk of these companies, however, showed a significant increase and both were found to be statistically significant. It appears that in the year of the cloud adoption, the median return on assets increased by 1.26 percent and this increase is statistically significant at the 1% level. There was, however, no significant increase in the year after the cloud adoption relative to the year before the adoption. Return on sales exhibits a similar pattern. Notably, there is a median increase from the year before the adoption to the year of adoption (0.60%) but this difference is not statistically significant. The median increase is 4.33% after the adoption and this increase is statistically significant at the .09% level. We do believe the present research shows that cloud computing adoption does provide financial benefits to the adopting firms.
    Keywords: Cloud computing adoption; event study methodology; market value of the adopting firms; return of sales; return of assets.

    by Mohammed Nasser Al-Mhiqani, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, Nathan L Clarke, Ameera Natasha Mohammad 
    Abstract: Insider threat represents one of the greatest challenges in the cyber security world. Insider attackers have more privileged and legitimate access to the information and facilities, compared to the outsider attackers. In fact, insider attacker has more accessibilities and higher potential to bring huge damage to the organization. However, the behaviour of the insider attacker generates many questions to ponder before a new taxonomy is created. Therefore, the main objective of this paper has two folds: a) to classify the insider threat for better understanding and b) propose a new taxonomy for insider threat with terminologies. To obtain the objective, the process starts with collecting and classifying the evident. Then, this study presents a hybrid insider threat classification based on combining insider threat access, motivation, indicator, types and actions, profile categorization, methods, and detection techniques. With the insights afforded by looking more closely at conceptual understanding, we describe how classification of insider threat may effectively be used in insider threat detection
    Keywords: Insider Threat; Insider Threat Detection; Security; Classification.
    DOI: 10.1504/IJISAM.2018.10014439
  • Using a Context-Based Complementary Model to Assess Business Value of Information Systems   Order a copy of this article
    by Asare Yaw Obeng, Mkhize Peter 
    Abstract: There are several divergent views on how information systems (IS) strategic value is assessed. IS-strategic value has been conceptualized mainly from the perspectives of resource-based theory to enhance internal operational effectiveness and the market-driven to leverage firm capabilities to achieve or sustain a strategic position. However, complex modern business environment has propelled combining diverse models to provide a more comprehensive approach to IS-strategic value assessment. The study proposes an integrative context-based model to understand the essence of leading an offensive strategic IS effort and how industry and/or firm-specific factors impact the performance of eight universal banks in Ghana. The emergent model could serve as a useful guideline and a conceptual basis of a holistic framework of analysing and establishing the competitive status of firms. The findings indicate the two perspectives are complementary, and their combined effect on operational and innovative performance is greater.
    Keywords: Complementary model; Bank; IS-business value; strategic asset; technological innovation.