591,578 research outputs found
Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing
Information sharing in organization has been considered as an important
approach in increasing organizational efficiency, performance and decision
making. With the present and advances in information and communication
technology, sharing information and exchanging of data across organizations has
become more feasible in organization. However, information sharing has been a
complex task over the years and identifying factors that influence information
sharing across organization has becomes crucial and critical. Researchers have
taken several methods and approaches to resolve problems in information sharing
at all levels without a lasting solution, as sharing is best understood as a
practice that reflects behavior, social, economic, legal and technological
influences. Due to the limitation of the conventional ISM3 standards to address
culture, social, legislation and human behavior, the findings in this paper
suggest that, a centralized information structure without human practice,
distribution of information and coordination is not effective. This paper
reviews the previous information sharing research, outlines the factors
affecting information sharing and the different practices needed to improve the
management of information security by recommending several combinations of
information security and coordination mechanism for reducing uncertainty during
sharing of information .This thesis proposes information security management
protocol (ISMP) as an enhancement towards ISM3 to resolve the above problems.
This protocol provides a means for practitioners to identify key factors
involved in successful information sharing....
Towards an integrated model for citizen adoption of E-government services in developing countries: A Saudi Arabia case study
This paper considers the challenges that face the widespread adoption of E-government in developing countries, using Saudi Arabian our case study. E-government can be defined based on an existing set of requirements. In this paper we define E-government as a matrix of stakeholders; governments to governments, governments to business and governments to citizens using information and communications technology to deliver and consume services. E-government has been implemented for a considerable time in developed countries. However E-government services still faces many challenges their implemented and general adoption in developing countries. Therefore, this paper presents an integrated model for ascertaining the intention to adopt E-government services and thereby aid governments in accessing what is required to increase adoption
Examining of the Effects of Employees on Work Stress, Role Conflict and Job Insecurity on Organizational Culture
Perceived work stress, It is stated that employees are psychologically disturbed and intensely threatening their health at their busy working tempo. Employees with a high degree of stress in the face of excessive workloads may experience burnout and intention to quit. Employees experiencing job insecurity cannot show their real performance and cannot get the efficiency they want from employees because they do not see themselves permanently in their organizations. However, they cannot achieve the desired efficiency due to the fact that employees who have a role conflict must fulfill more than one workload. Employees who are satisfied with their organizations are able to adopt organizational culture and develop their organizational skills such as planning and problem solving. Within the scope of the aim of the research, a survey was conducted with 350 employees. Some of the analyzes were performed using SPSS 25 Program and some of them were performed with AMOS program. Factor analysis and reliability analysis were applied to the questions using Likert scale. The results of factor analysis were checked by confirmatory factor analysis in AMOS. Correlation analysis was used to examine the relationships between variables, and regression analysis was used to test hypotheses
ERP implementation methodologies and frameworks: a literature review
Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history
Recommended from our members
Issues and challenges: cloud computing e-Government in developing countries
Cloud computing has become essential for IT resources that can be delivered as a service over the Internet. Many e-government services that are used worldwide provide communities with relatively complex applications and services. Governments are still facing many challenges in their implementation of e-government services in general, including Saudi Arabia, such as poor IT infrastructure, lack of finance, and insufficient data security. This research paper investigates the challenges of e-government cloud service models in developing countries. This paper finds that governments in developing countries are influenced by how the top management deals with the attention to the adoption of cloud computing. Further, organisational readiness levels of technologies, such as IT infrastructure, internet availability and social trust of the adoption of new technology as cloud computing, still present limitations for e-government cloud services adoption. Based on the findings of the critical review, this paper identifies the issues and challenges affecting the adoption of cloud computing in e- government such as IT infrastructure, internet availability, and trust adopted new technologies thereby highlighting benefits of cloud computing-based e-government services. Furthermore, we propose recommendations for developing IT systems focused on trust when adopting cloud computing in e-government services (CCEGov)
Recommended from our members
Evaluating the Provision of Botnet Defences using Translational Research Concepts.
Botnet research frequently draws on concepts from other fields. An example is the use of epidemiological models when studying botnet propagation, which facilitate an understanding of bot spread dynamics and the exploration of behavioural theory. Whilst the literature is rich with these models, it is lacking in work aimed at connecting the insights of theoretical research with day-to-day practice. To address this, we look at botnets through the lens of implementation science, a discipline from the field of translational research in health care, which is designed to evaluate the implementation process. In this paper, we explore key concepts of implementation science, and propose a framework-based approach to improve the provision of security measures to network entities. We demonstrate the approach using existing propagation models, and discuss the role of implementation science in malware defence
Identifying the relevance of personal values to e-government portals' success: insights from a Delphi study
Most governments around the world have put considerable financial resources into the development of e-government systems. They have been making significant efforts to provide information and services online. However, previous research shows that the rate of adoption and success of e-government systems vary significantly across countries. It is argued here that culture can be an important factor affecting e- government success. This paper aims to explore the relevance of personal values to the e-government success from an individual user’s perspective. The ten basic values identified by Schwartz were used. A Delphi study was carried out with a group of experts to identify the most relevant personal values to the e-government success from an individual’s point of view. The findings suggest that four of the ten values, namely Self-direction, Security, Stimulation, and Tradition, most likely affect the success. The findings provide a basis for developing a comprehensive e-government evaluation framework to be validated using a large scale survey in Saudi Arabia
- …