448 research outputs found

    E-Governance: Strategy for Mitigating Non-Inclusion of Citizens in Policy Making in Nigeria

    Get PDF
    The Nigerian federation that currently has 36 states structure adopted the Weberian Public Administrative system before now as an ideal way of running government, which was characterized with the traditional way of doing things without recourse to the deployment of Information Communication Technology (ICT). Today e-governance is seen as a paradigm shift from the previous way of governance. Research has shown that, the adoption and implementation of e-governance is more likely to bring about effective service delivery, mitigate corruption and ultimately enhance citizens’ participation in governmental affairs. However, it has been argued that infrastructure such as regular electricity power and access to the Internet, in addition to a society with high rate of literacy level are required to effectively implement and realize the potentials of e-governance for improved delivery of services. Due to the difficulties currently experienced, developing nations need to adequately prepare for the implementation of e-governance on the platform of Information Communication Technology (ICT). Hence, this study seeks to examine whether the adoption and implementation of e-governance in the context of Nigeria would mitigate the hitherto non-inclusion of citizens in the formulation and implementation of government policies aimed at enhanced development. To achieve the objective of the study, data were sourced and analyzed majorly by examining government websites of 20 states in the Nigerian federation to ascertain if there are venues for citizens to interact with government in the area of policy making and feedback on government actions, as a way of promoting participatory governance. The study revealed that the adoption and implementation of e-governance in the country is yet to fully take place. This is due to lack of infrastructure, low level of literacy rate and government inability to provide the necessary infrastructure for e-governance to materialize. The paper therefore, recommends among others the need for the Federal Government to involve a sound and clear policy on how to go about the adoption and implementation of egovernance through deliberate effort at increasing budgetary allocation towards infrastructural development and mass education of citizens

    The Impact of e-Democracy in Political Stability of Nigeria

    Get PDF
    The history of the Nigerian electoral process has been hitherto characterized by violence stemming from disputes in election outcomes. For instance, violence erupted across some states in Northern Nigeria when results indicated that a candidate who was popular in that part of the country was losing the election leading to avoidable loss of lives. Beside, this dispute in election outcome lingers for a long time in litigation at the electoral tribunals which distracts effective governance. However, the increasing penetrating use of ICTs in Nigeria is evident in the electoral processes with consequent shift in the behavior of actors in the democratic processes, thus changing the ways Nigerians react to election outcomes. This paper examines the trend in the use ICT in the Nigerian political system and its impact on the stability of the polity. It assesses the role of ICT in recent electoral processes and compares its impact on the outcome of the process in lieu of previous experiences in the Nigeria. Furthermore, the paper also examines the challenges and risks of implementing e-Democracy in Nigeria and its relationship to the economy in the light of the socio-economic situation of the country. The paper adopted qualitative approach in data gathering and analysis. From the findings, the paper observed that e-democracy is largely dependent on the level of ICT adoption, which is still at its lowest ebb in the country. It recognizes the challenges in the provision of ICT infrastructure and argues that appropriate low-cost infrastructure applicable to the Nigerian condition can be made available to implement e-democracy and thus arouse the interest of the populace in governance, increase the number of voters, and enhance transparency, probity and accountability, and participation in governance as well as help stabilize the nascent democrac

    Investigating e-procurement barriers within six Saudi Arabian SMEs

    Get PDF
    Thesis submitted for the degree of Doctor of Philosophy at the University of Bedfordshire.This study aims to investigate factors affecting the adoption of e-procurement in Saudi Arabian SMEs. The study adopted the Gunasekaran and Ngai (2009) model as a theoretical framework and foundation for the research to investigate current status and readiness, perceived benefits, perceived barriers, perceived critical success factors and perceived future organisational performance. Through an extensive literature review and detailed data analysis, the study extended the model to incorporate perceived cultural and external factors that were found to be necessary for the adoption of e-procurement in Saudi Arabian SMEs. Through case studies and AHP analysis, the proposed model elements were validated and prioritised in the Saudi Arabian context. Three different methods were adopted for data collection. First, an exploratory study was conducted to understand the current status of e-procurement and provide an overview of the factors that affect the adoption of e-procurement using the Gunasekaran and Ngai (2009) model.Second, a detailed survey was conducted to find the relative importance of various factors related to each of the five elements of the Gunasekaran and Ngai (2009) model. Third, detailed interviews were conducted across four selected SMEs to gain an insight into the factors that affect the adoption of e-procurement. The results of the exploratory study were helpful in identifying perceived factors that affect the adoption of e-procurement. Detailed survey analysis using AHP validated the theoretical framework and the relevance of the factors of the Gunasekaran and Ngai (2009) model. However, some of the factors were found to be more important than in the Gunasekaran and Ngai (2009) model, while others were less important. Results of the qualitative study (interviews) found additional factors that were relevant to each of the five elements of the GN model. They further suggested that “Current e-procurement activities” was an additional factor in the “current status and readiness” element and “Increased transparency” was an additional factor in the “perceived benefits” element. Similarly, the analysis of the qualitative results found two additional factors in the “perceived barriers” element (i.e. absence of e-procurement specific laws and regulations and lack of trust in the electronic transfer of funds), three additional critical success factors (i.e. cost-benefit analysis of the solution, technical maturity of the marketplace and user-friendliness of the solution) and two additional factors in perceived future organisational performance (i.e. strategic alliance and networking and knowledge management and data warehousing). Further, analysis of the qualitative findings revealed two additional elements (i.e. perceived external and perceived cultural factors). The study thus suggests that organisational culture, cultural inertia and business culture of the country are three important cultural factors that are perceived to affect the adoption of e-procurement, while government support, having one’s own postal addresses and delivery services, providing secure and trustworthy online payment options, low cost and high speed internet connection, suppliers’ willingness and readiness, pressure from competitors, policy and regulations are the seven important perceived external factors that affect the adoption of e-procurement in Saudi Arabian SMEs. The results of the qualitative data analysis led to the development of an extended Gunasekaran and Ngai (2009) model to incorporate perceived culture and perceived external factors. The study has significant implications in terms of further e-procurement research for SMEs in Saudi Arabia and also its adoption in the developing world in general

    Security Enhanced Applications for Information Systems

    Get PDF
    Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments

    Decision-Maker’s Preferences Modelling through PROMETHEE Method for Supplier Selection

    Get PDF
    Multi-Criteria Decision Aid (MCDA) approach is widely applied in different decision-making contexts including supply chain management and supplier selection. PROMETHEE is one of the most popular MCDA method that allows the Decision-Maker integrating explicitly his/her preference to choose the alternative of the best compromise. In this paper we are applying this method to select the best supplier where several incommensurable and conflicting criteria are simultaneously taken into consideration. The decision-making context is related to an Information Technology department within a management company in Doha, Qatar. We will illustrate how the Decision-Maker’s preferences were integrated in the model for selecting the supplier of the best comprises and how the Decision-Maker was evolving towards the best recommendatio

    Linked Open Data - Creating Knowledge Out of Interlinked Data: Results of the LOD2 Project

    Get PDF
    Database Management; Artificial Intelligence (incl. Robotics); Information Systems and Communication Servic

    Data analytics 2016: proceedings of the fifth international conference on data analytics

    Get PDF

    Experimental Evaluation of Growing and Pruning Hyper Basis Function Neural Networks Trained with Extended Information Filter

    Get PDF
    In this paper we test Extended Information Filter (EIF) for sequential training of Hyper Basis Function Neural Networks with growing and pruning ability (HBF-GP). The HBF neuron allows different scaling of input dimensions to provide better generalization property when dealing with complex nonlinear problems in engineering practice. The main intuition behind HBF is in generalization of Gaussian type of neuron that applies Mahalanobis-like distance as a distance metrics between input training sample and prototype vector. We exploit concept of neuron’s significance and allow growing and pruning of HBF neurons during sequential learning process. From engineer’s perspective, EIF is attractive for training of neural networks because it allows a designer to have scarce initial knowledge of the system/problem. Extensive experimental study shows that HBF neural network trained with EIF achieves same prediction error and compactness of network topology when compared to EKF, but without the need to know initial state uncertainty, which is its main advantage over EKF

    Bioinspired metaheuristic algorithms for global optimization

    Get PDF
    This paper presents concise comparison study of newly developed bioinspired algorithms for global optimization problems. Three different metaheuristic techniques, namely Accelerated Particle Swarm Optimization (APSO), Firefly Algorithm (FA), and Grey Wolf Optimizer (GWO) are investigated and implemented in Matlab environment. These methods are compared on four unimodal and multimodal nonlinear functions in order to find global optimum values. Computational results indicate that GWO outperforms other intelligent techniques, and that all aforementioned algorithms can be successfully used for optimization of continuous functions
    • …
    corecore