4 research outputs found
Information quality in Cloud Computing: improvement or deterioration
Abstract The convergence of previous technologies such as Virtualization, Grid computing, Distributed computing, Web Services and Service Oriented Architecture, have come with a good timing contributing to build up Cloud Computing. The services usually found in local data centers are now offered to be delivered from outside of the company, with the possibility of a virtually unlimited quantity of computer resources. But we need to consider how beneficial or unfavorable this new setting is, for issues not completely solved in the past, such as Data Quality. The objective of this study is to form a simplified model that can be used to identify the impact of cloud computing on information quality attribute, being able to measure it, and with this look for improvements in the system quality overall. The results can be useful to people involved in information technology management, data management personnel, system development, project management, and data architecture
Recommended from our members
Development of a Risk Assessment Model for Global Information Technology Outsourcing
Global Information Technology (IT) outsourcing has been recognized to have important potential benefits. However, researchers and practitioners also recognize potential risks involved in global IT outsourcing, which sometimes lead to undesirable consequences. This paper develops a model to assess risks in global IT outsourcing. Specifically, this paper begins by identifying global IT outsourcing risk factors by considering the national infrastructure, organizational infrastructure, and project environment. Second, a Global IT Outsourcing (GITO) engagement model for risk assessment is developed to logically link all these risk factors together. Third, one quantifiable approach based on a relative-weighted assessment model is presented to demonstrate how the risks in the GITO engagement model can actually be measured and assessed. Such an overall measurement of global IT outsourcing risks establishes a reference point for assessing global IT project outsourcing risks, and will assist managers to enhance global IT outsourcing’s effectiveness and realize its vast potential. This paper will also benefit high-level decision makers including executives, policy planners, and managers working on decisions regarding global IT outsourcing, such as decisions on selecting an outsourcee country with a lower level of risk
E-government effectiveness: a rocket model of contributing user-related factors
Abstract: This paper proposes an extended and holistic model of e-government effectiveness and user factors in the areas of technology acceptance model, contingency theory, and general systems theory used as the basis for the development of the ‘Rocket Model’ to demonstrate how e-government initiatives can be effective. The model is validated using two methods: (1) well established theories and (2) the five component model of an information system. A quantitative tool based on weighted scores is also used to assess the model and demonstrate its usefulness for best practices
Development of an M-commerce security framework
Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts