运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government I...运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government Information Quarterly的研究方向和主题主要包括以下五个方面:电子政务基础理论研究,电子政务的实践应用,政府信息管理,电子政务的技术基础,电子政务的发展过程和前景。展开更多
We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In...We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system.展开更多
In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influ...In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influence upon the governm ental information resources sharing and the efficiency of the e-government affairs,hindering inform ation connectivity,so that the government management cannot meet the need of society,nor can the e-governm ent develop in the long run.This paper attempts to analyze the embodiment and causes of the phenomenon of information silo,putting forward measures of solving the problem of inform ation silo.展开更多
The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. Th...The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and systematic way to protect their e-Business activities. However, the suitability of available information security standards for Small and Medium e-Business Enterprises (e-SME) is worth further investigation. In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. Accordingly, several challenges associated with these standards that may render them difficult to be implemented in e-SME have been identified.展开更多
Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a m...Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a model of citizen trust in e-government in an effort to study the impacts of trust-related factors on citizen intentions to adopt e-government services.Design/methodology/approach:The data was collected from an online survey of 182Chinese users who had more than 3 years' online experiences of using government websites.Structural equation modeling analysis was used to validate the proposed model.Findings:Our survey shows that trust in e-government,perceived usefulness and perceived ease of use are critical factors that influence citizen intentions to use e-government services.The study findings also indicate that citizen trust in e-government is positively associated with trust in government,institution-based trust and perceived usefulness of e-government services.Research limitations:The survey sampled adults aged from 25 to 35 years old.Such a limited sample group cannot represent all of the population.So a larger sample involving more experienced online users will yield more useful results.Practical implications:The study results will help government agencies,especially the Chinese government agencies,find ways to improve the Chinese citizens' trust in e-government and promote their adoptions of e-government services.Originality/value:Previous researches have investigated separately the impacts of user evaluation of government websites and user trust in e-government on user intentions to engage in e-government.This study makes a theoretical contribution by integrating these two perspectives and building a model of citizen trust in e-government in understanding the impacts of trust-related factors on citizens' adoptions of e-government initiatives.展开更多
The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The i...The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures.展开更多
The study was looking at establishing factors that are affecting the adoption of electronic government services in the Developing Countries for Transport sector amidst the Covid-19 pandemic based on the Unified Theory...The study was looking at establishing factors that are affecting the adoption of electronic government services in the Developing Countries for Transport sector amidst the Covid-19 pandemic based on the Unified Theory of Acceptance and Use of Technology Model (UTAUT). The study first looked at the major challenges faced by the Zambian transport sector in the implementation of e-government services among the citizens. The study then proposed a model through a web-based e-commerce web portal that could be adopted to address the challenges identified in the study. The study was based on all registered motor vehicles. These were from the various transport sectors in Zambia’s capital city, Lusaka. Both qualitative and quantitative data was collected from respondents using a structured questionnaire. The questionnaire was generated based on the UTAUT conceptual model. The response rate was 57% giving 141 questionnaire responses from the four transport providers. The Chi-Square test of independence was used to analyze the data using SPSS software. The results showed that interaction between trust in government and trust in the Internet has a significant effect on the utilisation of e-government services. The test had an observed P-Value of 0.05 against the Chi-Square value of 59.535. The results further showed that e-services control and effort expectancy had a significant impact on the actual utilisation of e-government services.展开更多
Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, en...Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, enhances services, boosts efficiency, and saves time. The Government of Saudi Arabia has had various obstacles in serving its populace. Poor service delivery and excessive Government operating costs resulted from this manual service delivery. As a result, the Government launched the E-Government systems, which provide services more quickly. As a result, the report covered Saudi Arabia’s efforts to adopt E-Government, its difficulties, and its objectives to advance the 2030 vision. This study examined the adoption of E-Government systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) in Saudi Arabia. A sample size of 200 was estimated using the Convenience approach and received 58% of the response from employees and end-users of the E-Government systems. Data were analyzed using MS-Excel and SMART PLS for testing the hypothesis and applying the Partial Least Square approach. The results of the hypothesis testing reveal several meaningful relationships, including relative benefits, compatibility, security, management support, performance expectations, perceived Usefulness of E-Government, ease of use by reducing uncertainty to E-Government, and IT infrastructure by reducing language on E-Government adoption.展开更多
Governance is a process of establishing policies or laws and continuously monitoring their implementation in the public. Citizens are the main stakeholders in this process. To make the governance process cost effectiv...Governance is a process of establishing policies or laws and continuously monitoring their implementation in the public. Citizens are the main stakeholders in this process. To make the governance process cost effective, easy and convenient to the citizens, information and communication technologies (ICTs) are playing a vital role. Using ICTs in governance domain can be referred as e-governance. It helps citizen to participate not only in policy making but also in service quality improvements and getting government services over network. Web technology is one of the major technologies that have been used in e-governance as a major contributor. Before invention of web, citizens used to write their opinions and send to concerned body via post mail or local suggestion box for improvements of services. After the invention of the web, it became possible to post or send the opinions/comments over organization’s web sites or portals. As the number of comments increases over the web, it is very difficult to have relevant information for furthering the decision making processes. In these study, text processing and data mining techniques have been used. The prototype system classifies citizen’s opinions in one of six service categories with the precision of 87.3% and recall of 85.8%. Further, the system determines opinions as appreciation with the precision of 100% for both depression and appreciation, and average recall of 90.85% for both depression and appreciation. The results obtained from the prototype system indicate that the techniques that have been applied are promising for real world application in e-governance.展开更多
The Information and Communication Technologies play an important role in rural development. The Empowerment of rural communities is crucial for the development of the rural region. Bringing the people in the rural reg...The Information and Communication Technologies play an important role in rural development. The Empowerment of rural communities is crucial for the development of the rural region. Bringing the people in the rural region in the mainstream of the digital technologies to access and adopt modern technologies is a major concern now. Rural Development implies both, the economic development of the people and greater social transformation using electronic governance (e-governance). In order to provide the rural people in Maharashtra with better prospects and opportunities for economic development, agricultural development and management, marketing management, increased participation of rural people in usage and adoption of information and communication technologies (ICTs) is envisaged. This paper aims to explore the nature, role and relevance of the Electronic/Digital Governance using ICTs and wireless technologies for agriculture and rural development in the rural regions. It also aims to study the impact of e-governance on rural development and methods for improving local environmental governance having regard particularly to the range of interests and actors involved in e-governance. The paper examines the current status of electronic governance in Jalgaon district in India. It focuses on development of the model using ICTs/wireless technologies for e-governance of Jalgaon district in Maharashtra state, India.展开更多
This paper proposes a comprehensive and practical approach to implement a land administration act in Sri Lanka followed by setting up a Land Administration Commission (LAC), which is a separate entity to maintain a La...This paper proposes a comprehensive and practical approach to implement a land administration act in Sri Lanka followed by setting up a Land Administration Commission (LAC), which is a separate entity to maintain a Land Administration Database Management System in support of the land information collected and maintained by stakeholders who deal with matters related to land and its decision-making under e-governance concept. Also, It describes the operations of the four core functions: land tenure, land valuation, land use, and land development in land administration under a single sustainable national land policy, underpinned by spatial information under the e-Governance mechanism. Further, the paper identifies the stakeholders and their main responsibilities in each of the four core functions with the current issues in sharing information across stakeholders. Finally, the paper describes setting up a Land administration entity thereby empowering the LAC and introduces spatial information layers at different resolution levels in a centralized land administration spatial database to keep track of all land transactions carried out by each stakeholder. This approach will enable the top-level decision-making authority (the central level) to manage all land-related activities under one platform to contribute towards the sustainable land development of the country. It is proposed to implement this approach as a pilot activity in the district of Colombo and expand it in the entire country gradually with its output.展开更多
文摘运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government Information Quarterly的研究方向和主题主要包括以下五个方面:电子政务基础理论研究,电子政务的实践应用,政府信息管理,电子政务的技术基础,电子政务的发展过程和前景。
文摘We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system.
文摘In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influence upon the governm ental information resources sharing and the efficiency of the e-government affairs,hindering inform ation connectivity,so that the government management cannot meet the need of society,nor can the e-governm ent develop in the long run.This paper attempts to analyze the embodiment and causes of the phenomenon of information silo,putting forward measures of solving the problem of inform ation silo.
文摘The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and systematic way to protect their e-Business activities. However, the suitability of available information security standards for Small and Medium e-Business Enterprises (e-SME) is worth further investigation. In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. Accordingly, several challenges associated with these standards that may render them difficult to be implemented in e-SME have been identified.
基金supported by the National Social Science Foundation of China(No.:09&ZD039)
文摘Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a model of citizen trust in e-government in an effort to study the impacts of trust-related factors on citizen intentions to adopt e-government services.Design/methodology/approach:The data was collected from an online survey of 182Chinese users who had more than 3 years' online experiences of using government websites.Structural equation modeling analysis was used to validate the proposed model.Findings:Our survey shows that trust in e-government,perceived usefulness and perceived ease of use are critical factors that influence citizen intentions to use e-government services.The study findings also indicate that citizen trust in e-government is positively associated with trust in government,institution-based trust and perceived usefulness of e-government services.Research limitations:The survey sampled adults aged from 25 to 35 years old.Such a limited sample group cannot represent all of the population.So a larger sample involving more experienced online users will yield more useful results.Practical implications:The study results will help government agencies,especially the Chinese government agencies,find ways to improve the Chinese citizens' trust in e-government and promote their adoptions of e-government services.Originality/value:Previous researches have investigated separately the impacts of user evaluation of government websites and user trust in e-government on user intentions to engage in e-government.This study makes a theoretical contribution by integrating these two perspectives and building a model of citizen trust in e-government in understanding the impacts of trust-related factors on citizens' adoptions of e-government initiatives.
文摘The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures.
文摘The study was looking at establishing factors that are affecting the adoption of electronic government services in the Developing Countries for Transport sector amidst the Covid-19 pandemic based on the Unified Theory of Acceptance and Use of Technology Model (UTAUT). The study first looked at the major challenges faced by the Zambian transport sector in the implementation of e-government services among the citizens. The study then proposed a model through a web-based e-commerce web portal that could be adopted to address the challenges identified in the study. The study was based on all registered motor vehicles. These were from the various transport sectors in Zambia’s capital city, Lusaka. Both qualitative and quantitative data was collected from respondents using a structured questionnaire. The questionnaire was generated based on the UTAUT conceptual model. The response rate was 57% giving 141 questionnaire responses from the four transport providers. The Chi-Square test of independence was used to analyze the data using SPSS software. The results showed that interaction between trust in government and trust in the Internet has a significant effect on the utilisation of e-government services. The test had an observed P-Value of 0.05 against the Chi-Square value of 59.535. The results further showed that e-services control and effort expectancy had a significant impact on the actual utilisation of e-government services.
文摘Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, enhances services, boosts efficiency, and saves time. The Government of Saudi Arabia has had various obstacles in serving its populace. Poor service delivery and excessive Government operating costs resulted from this manual service delivery. As a result, the Government launched the E-Government systems, which provide services more quickly. As a result, the report covered Saudi Arabia’s efforts to adopt E-Government, its difficulties, and its objectives to advance the 2030 vision. This study examined the adoption of E-Government systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) in Saudi Arabia. A sample size of 200 was estimated using the Convenience approach and received 58% of the response from employees and end-users of the E-Government systems. Data were analyzed using MS-Excel and SMART PLS for testing the hypothesis and applying the Partial Least Square approach. The results of the hypothesis testing reveal several meaningful relationships, including relative benefits, compatibility, security, management support, performance expectations, perceived Usefulness of E-Government, ease of use by reducing uncertainty to E-Government, and IT infrastructure by reducing language on E-Government adoption.
文摘Governance is a process of establishing policies or laws and continuously monitoring their implementation in the public. Citizens are the main stakeholders in this process. To make the governance process cost effective, easy and convenient to the citizens, information and communication technologies (ICTs) are playing a vital role. Using ICTs in governance domain can be referred as e-governance. It helps citizen to participate not only in policy making but also in service quality improvements and getting government services over network. Web technology is one of the major technologies that have been used in e-governance as a major contributor. Before invention of web, citizens used to write their opinions and send to concerned body via post mail or local suggestion box for improvements of services. After the invention of the web, it became possible to post or send the opinions/comments over organization’s web sites or portals. As the number of comments increases over the web, it is very difficult to have relevant information for furthering the decision making processes. In these study, text processing and data mining techniques have been used. The prototype system classifies citizen’s opinions in one of six service categories with the precision of 87.3% and recall of 85.8%. Further, the system determines opinions as appreciation with the precision of 100% for both depression and appreciation, and average recall of 90.85% for both depression and appreciation. The results obtained from the prototype system indicate that the techniques that have been applied are promising for real world application in e-governance.
文摘The Information and Communication Technologies play an important role in rural development. The Empowerment of rural communities is crucial for the development of the rural region. Bringing the people in the rural region in the mainstream of the digital technologies to access and adopt modern technologies is a major concern now. Rural Development implies both, the economic development of the people and greater social transformation using electronic governance (e-governance). In order to provide the rural people in Maharashtra with better prospects and opportunities for economic development, agricultural development and management, marketing management, increased participation of rural people in usage and adoption of information and communication technologies (ICTs) is envisaged. This paper aims to explore the nature, role and relevance of the Electronic/Digital Governance using ICTs and wireless technologies for agriculture and rural development in the rural regions. It also aims to study the impact of e-governance on rural development and methods for improving local environmental governance having regard particularly to the range of interests and actors involved in e-governance. The paper examines the current status of electronic governance in Jalgaon district in India. It focuses on development of the model using ICTs/wireless technologies for e-governance of Jalgaon district in Maharashtra state, India.
文摘This paper proposes a comprehensive and practical approach to implement a land administration act in Sri Lanka followed by setting up a Land Administration Commission (LAC), which is a separate entity to maintain a Land Administration Database Management System in support of the land information collected and maintained by stakeholders who deal with matters related to land and its decision-making under e-governance concept. Also, It describes the operations of the four core functions: land tenure, land valuation, land use, and land development in land administration under a single sustainable national land policy, underpinned by spatial information under the e-Governance mechanism. Further, the paper identifies the stakeholders and their main responsibilities in each of the four core functions with the current issues in sharing information across stakeholders. Finally, the paper describes setting up a Land administration entity thereby empowering the LAC and introduces spatial information layers at different resolution levels in a centralized land administration spatial database to keep track of all land transactions carried out by each stakeholder. This approach will enable the top-level decision-making authority (the central level) to manage all land-related activities under one platform to contribute towards the sustainable land development of the country. It is proposed to implement this approach as a pilot activity in the district of Colombo and expand it in the entire country gradually with its output.