58,957 research outputs found

    Electronic information sharing in local government authorities: Factors influencing the decision-making process

    Get PDF
    This is the post-print version of the final paper published in International Journal of Information Management. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2013 Elsevier B.V.Local Government Authorities (LGAs) are mainly characterised as information-intensive organisations. To satisfy their information requirements, effective information sharing within and among LGAs is necessary. Nevertheless, the dilemma of Inter-Organisational Information Sharing (IOIS) has been regarded as an inevitable issue for the public sector. Despite a decade of active research and practice, the field lacks a comprehensive framework to examine the factors influencing Electronic Information Sharing (EIS) among LGAs. The research presented in this paper contributes towards resolving this problem by developing a conceptual framework of factors influencing EIS in Government-to-Government (G2G) collaboration. By presenting this model, we attempt to clarify that EIS in LGAs is affected by a combination of environmental, organisational, business process, and technological factors and that it should not be scrutinised merely from a technical perspective. To validate the conceptual rationale, multiple case study based research strategy was selected. From an analysis of the empirical data from two case organisations, this paper exemplifies the importance (i.e. prioritisation) of these factors in influencing EIS by utilising the Analytical Hierarchy Process (AHP) technique. The intent herein is to offer LGA decision-makers with a systematic decision-making process in realising the importance (i.e. from most important to least important) of EIS influential factors. This systematic process will also assist LGA decision-makers in better interpreting EIS and its underlying problems. The research reported herein should be of interest to both academics and practitioners who are involved in IOIS, in general, and collaborative e-Government, in particular

    Security governance and networks: New theoretical perspectives in transatlantic security

    Get PDF
    The end of the Cold War has not only witnessed the rise of new transnational threats such as terrorism, crime, proliferation and civil war; it has also seen the growing role of non-state actors in the provision of security in Europe and North America. Two concepts in particular have been used to describe these transformations: security governance and networks. However, the differences and potential theoretical utility of these two concepts for the study of contemporary security have so far been under-examined. This article seeks to address this gap. It proposes that security governance can help to explain the transformation of Cold War security structures, whereas network analysis is particularly useful for understanding the relations and interactions between public and private actors in the making and implementation of national and international security policies

    The STIN in the Tale: A Socio-technical Interaction Perspective on Networked Learning

    Get PDF
    In this paper, we go beyond what have been described as 'mechanistic' accounts of e-learning to explore the complexity of relationships between people and technology as encountered in cases of networked learning. We introduce from the social informatics literature the concept of sociotechnical interaction networks which focus on the interplay between participants, technology, learning artefacts and practices. We apply this concept to case material drawn from transnational trade union education to identify and to analyse three aspects of networked learning: the local sociotechnical networks of learners; the construction of an overarching, global sociotechnical network for learning; and the evolution of such networks over time. Finally we identify issues for further research highlighted by these models

    Emerging technologies for learning (volume 2)

    Get PDF

    Towards evaluation design for smart city development

    Get PDF
    Smart city developments integrate digital, human, and physical systems in the built environment. With growing urbanization and widespread developments, identifying suitable evaluation methodologies is important. Case-study research across five UK cities - Birmingham, Bristol, Manchester, Milton Keynes and Peterborough - revealed that city evaluation approaches were principally project-focused with city-level evaluation plans at early stages. Key challenges centred on selecting suitable evaluation methodologies to evidence urban value and outcomes, addressing city authority requirements. Recommendations for evaluation design draw on urban studies and measurement frameworks, capitalizing on big data opportunities and developing appropriate, valid, credible integrative approaches across projects, programmes and city-level developments

    Security models for trusting network appliances

    Get PDF
    A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions
    • …
    corecore