70,381 research outputs found

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    The complexities of electronic services implementation and institutionalisation in the public sector

    Get PDF
    This is the post-print version of the final paper published in Information & Management. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2013 Elsevier B.V.Electronic service implementation (ESI) in the public sector attempts to improve efficiency, effectiveness, and transparency of governmental departments. Despite having provided the necessary infrastructure and investment, many governments have struggled to realise such aims due to the various forces that challenge implementation and institutionalisation. Using institutional theory as a lens, we explored the forces influencing the implementation and institutionalisation of ESI in the public sector. While our results reinforced previous research in IT implementation and organisational transformation, they showed that the dynamic nature of technology poses unanticipated pressures, and that these can impede the implementation and institutionalisation process

    A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy

    Full text link
    Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted e-government services. This paper presents an information security evaluation framework based on new fuzzy multi criteria decision making (MCDM) to help policy makers conduct comprehensive assessment of e-government security strategy.Comment: IEEE 4th International Conference on Application of Information and Communication Technologies AICT201

    Incentives for the adoption of e-government by Greek municipalities

    Get PDF
    Purpose: The research aims to identify the incentives that play an important role in the evolution of e-government in Greece at local scale and its actual development level. It also investigates the factors and the perceived barriers that affect the development of local egovernment in Greek Municipalities, as well as the benefits they derive from it. Design/Methodology/Approach: The research is based on a survey that was conducted through a questionnaire to all 325 Municipalities of the country and includes data from 109 Municipalities that participated in the quantitative approach. Findings: While e-government is spread at a relatively satisfactory level, it appears that only a few Municipalities are performing well. Results highlight also the two main incentives that motivate Municipalities to adopt e-government: The first is the improvement of the efficiency of information exchange with the external environment and the second is managing internal issues-relationships in conjunction with the existence of prominent IT departments. Amongst the main factors that affect e-government adoption by Local authorities, budgetary constraints stand out, while the lack of personnel specialized in Information Technologies is identified as common obstacle. Practical Implications: Findings suggest that an integrated approach to e-government is needed in order to enable organizations to minimize failures and to overcome barriers and counter risks. The capacity to align e-government applications with the increasing and evolving needs and requirements of the citizens is the key to optimizing the benefits of eGovernment at local scale. Originality/Value: There is no similar empirical research in the context of Greece; hence, it seems important to increase the knowledge about the drivers of e-government adoption, especially in the public sector at the local scale.peer-reviewe

    Examining citizens' perceived value of internet of things technologies in facilitating public sector services engagement

    Get PDF
    YesWith the advancement of disruptive new technologies, there has been a considerable focus on personalisation as an important component in nurturing users' engagement. In the context of smart cities, Internet of Things (IoT) offer a unique opportunity to help empower citizens and improve societies' engagement with their governments at both micro and macro levels. This study aims to examine the role of perceived value of IoT in improving citizens' engagement with public services. A survey of 313 citizens in the UK, engaging in various public services, enabled through IoT, found that the perceived value of IoT is strongly influenced by empowerment, perceived usefulness and privacy related issues resulting in significantly affecting their continuous use intentions. The study offers valuable insights into the importance of perceived value of IoT-enabled services, while at the same time, providing an intersectional perspective of UK citizens towards the use of disruptive new technologies in the public sector

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given
    corecore