4 research outputs found

    Information quality in Cloud Computing: improvement or deterioration

    Get PDF
    Abstract The convergence of previous technologies such as Virtualization, Grid computing, Distributed computing, Web Services and Service Oriented Architecture, have come with a good timing contributing to build up Cloud Computing. The services usually found in local data centers are now offered to be delivered from outside of the company, with the possibility of a virtually unlimited quantity of computer resources. But we need to consider how beneficial or unfavorable this new setting is, for issues not completely solved in the past, such as Data Quality. The objective of this study is to form a simplified model that can be used to identify the impact of cloud computing on information quality attribute, being able to measure it, and with this look for improvements in the system quality overall. The results can be useful to people involved in information technology management, data management personnel, system development, project management, and data architecture

    E-government effectiveness: a rocket model of contributing user-related factors

    Get PDF
    Abstract: This paper proposes an extended and holistic model of e-government effectiveness and user factors in the areas of technology acceptance model, contingency theory, and general systems theory used as the basis for the development of the ‘Rocket Model’ to demonstrate how e-government initiatives can be effective. The model is validated using two methods: (1) well established theories and (2) the five component model of an information system. A quantitative tool based on weighted scores is also used to assess the model and demonstrate its usefulness for best practices

    Development of an M-commerce security framework

    Get PDF
    Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts
    corecore