791 research outputs found

    Cloud computing in government organizations: towards a new comprehensive model

    Get PDF
    Cloud computing is a new information technology paradigm, one which has been adopted in many different sectors. Many developing countries are working on improving e-government to provide services to their citizens that are integrated and effective. Therefore, the Saudi government has made improving e-government a high priority. The aim of this study is to explore significant factors affecting the adoption of cloud computing in e-government services in Saudi Arabia as a case study. After identifying these factors, we propose a new comprehensive model for the Adoption of Cloud Computing in Saudi G-GOVernment (ACCE-GOV) that has been adopted from the Technology Organisation Environment (TOE) framework and the Diffusion of Innovations (DOI) theory. This research model examines factors of technological context (compatibility, complexity, service quality, security, and relative advantages), organisational context (top management support, organisation size, and technology readiness), environmental context (regulations and competitive pressures), and social context (awareness, trust, and attitude) in regard to the adoption of cloud computing. Ultimately, this study enhances the decision-making of the Saudi government through understanding and highlighting the most important factors that influence the adoption of cloud computing in an e-government context. This is a position paper, reporting on the work in progress. The findings of this study will be useful for the researchers who considers suitability of different methodological approaches for cloud computing adoption and evaluation

    Terrorism in Australia: Myth or reality? A psychometric study into the Western Australian public\u27s perception of terrorism

    Get PDF
    Terrorism is not a new concept as terrorist individuals and organisations since time immemorial have used the threat of violence or actual violence to generate fear in individuals, organisations and governments alike. Fear is a powerful weapon and it is used in order to gain political, ideological or religious objectives. The attacks on the World Trade Centre and the Pentagon on the 11th September 2001 (9/11) highlighted the dangers of the inadequate intelligence, border security and immigration practices that led to this event. The attacks were a security wake up call not only for the United States of America but for the entire world. The 9/11 attacks and other more recent terrorist attacks such as the Bali (12th October 2002 & 1st October 2005), Madrid (11th March 2004) and London (7th July 2005) bombings have sent security shockwaves around the world, as governments scramble to ensure that their own anti-terrorism security strategies are adequate to meet this new threat. The Federal Australian government undertook a range of security reviews and participated in a number of regional forums, bilateral pacts and international counter terrorism aid partnerships. Domestically, Australia also enhanced its capacity to respond to a possible terrorism event through multiple security enhancements across key areas including border security, defence and intelligence based agencies. In partnership with these new security initiatives a national public counter terrorism campaign was implemented in December 2002. Due to the unprecedented nature of these terrorist events, there has been little specific research into how terrorist events have impacted on the Australian public or how the public\u27s social psychometric risk perception of terrorism contrasts with other known risks. This study\u27s purpose was to address this shortfall in knowledge, by examining key social and security changes in Australian society post 9/11. The study used a number of primary and secondary data sources, a literature review and a research survey to address the study\u27s research questions. The research survey was based on a Likert scale devised to measure the public\u27s psychometric risk perceptions of terrorism. This research compared terrorism to other similar risks and found it ranked second highest in terms of dread risk and midrange in terms of familiarity risk. The study recommended changes to current first response management practices and reinforced that there was an ongoing need for research into public risk perception and public awareness safety campaigns. It is only through an understanding of the public\u27s reactions to risk that policy and decision-makers can promote and implement effective health, safety and security reforms that will be of benefit to both industry and the general community alike

    Media convergence, obscenity law and the Internet

    Full text link
    Digitization and innovation in technology has resulted in a climate of media convergence. Media convergence occurs when elements of previously distinctly separate media forms co-mingle to create new capabilities. Although there is no such thing as complete convergence as of yet, there is probably the closest thing to a purely converged medium. Any user is able to access a variety of text, hypertext, graphic, audio and video files online. However, it is also because of media convergence that makes the Internet difficult to regulate. Laws that were proposed to provide some form of legal control to the access of online content have been met with strong opposition. This thesis will discuss the elements of media convergence and the Internet, difficulties in creating laws for a convergent medium, and examine potential solutions, independent of government action, that could help provide some form of control in the currently anarchical realm of cyberspace

    THE CHANGING FACE OF POLICING: LOCAL ISSUES IN NATIONAL PERSPECTIVE

    Get PDF
    The thesis reviews the changes which have taken place in policing England and Wales between 1950 and 1998 with particular reference to foui* key themes: community policmg, crime preverition, victims of crime and quality ofservice. It contributes to ah understanding of how policing has developed during a period of significant social change and explores the rationale which has underpinned legislative development and policy making at national and force levels whilst identifying the significance of these changes within a local city environment. The development of the key themes at national level is considered within the local policing environment of the south-west of England. This has been undertaken with particular reference to the way in which they have influenced the direction of policing within Devon and Cornwall and, in particular, how aspects of their implementation have been perceived by both police officers and sections of the public within the largest urban area of the two counties, the city of Plymouth. Much of the detailed research within the city has concentrated upon the area of Stonehouse, forming part of the St Peter ward; an area which has been identified as one of the most socially and economically deprived locations in England. Through personal interviews, telephone and postal questionnaires, and an insider's ethnographic perspective, the study is brought into local focus. This allows critical analysis of the key themes in terms of their local development against the national perspective.Faculty of Human Science

    The Relationship Between Job Satisfaction and Attrition in Youth Care Workers

    Get PDF
    This exploratory quantitative study was conducted to determine the relationship between job satisfaction and attrition among current and former youth care workers in a group home setting. Participants (N = 35) included 14 current employees and 21 former employees from the Sheriffs Youth Programs of Minnesota Agency that completed a job satisfaction survey. The survey results show a significant correlation among current and former youth care worker\u27s perceptions in relation to job satisfaction. Specifically, the current and former youth care workers both identified training as the most important characteristic to their job satisfaction. Additionally, former employees identified supervision issues as a key attribute to attrition within the workplace. These findings may offer assistance to employers and employees in determining factors contributed to job satisfaction and voluntary turnover in this field. Implications for social work practice and policy are discussed

    Information and communication technology adoption among small and medium enterprises in the northern region of Malaysia

    Get PDF
    Malaysian small and medium enterprises (SMEs) still have not fully utilized the information and communications technology (ICT) tools to their fullest potential. Hence, there is a need to determine the factors that contribute to ICT adoption among SMEs. This study was undertaken to examine the variables that contribute to the ICT adoption among the SMEs in Malaysia by examining the relationships between relative advantage, security, compatibility, complexity, cost and environmental pressure (normative, mimetic and coercive) and JCT adoption. Additionally, government support was examined as a moderator. The triangulation theory approach, which integrates technology-organization­ environment, diffusion of innovation and the institutional theory was used to explain the relationships between the variables. A total of 183 owners-managers of SMEs, representing a response rate of 47.6 percent, participated in this study. The data was collected via self­ administered questionnaires, and PLS-SEM was used to analyze them and test the hypotheses. Statistical results indicated that relative advantage and security are positively related while complexity is negatively related to ICT adoption. Conversely, compatibility, cost and environmental pressure (normative, mimetic and coercive) are not related to ICT adoption. Moreover, the moderating test result reveals that government support only moderates the relationship between security, compatibility, complexity and cost, and ICT adoption. Conversely, no empirical support is found for the moderating effect of government support on the relationship between relative advantage and environmental pressure, and ICT adoption. The major theoretical contribution of this research is that it examines environmental pressure as a multidimensional independent variable. Besides that, the study also examines the role of government support as a moderating variable. This study also provides some suggestions to SMEs, policy-makers, ICT support system developers and vendors on ways to improve existing plan and policies for encouraging ICT adoption among SMEs. Finally, recommendations for future research are discussed

    Cultural Responses to volcanic hazards on Mt Merapi, Indonesia

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Adapting information operations to a changing world: Future options for the United States government

    Get PDF
    In 1998, the Department of Defense in the United States released the first of a series of seminal policies on Information Operations (IO). Entitled Joint Publication 3-13, this instruction laid out for the first time, in an unclassified format, how the American military forces could utilise this particular element of power. As a relative newly defined activity, this publication proposed to revolutionise the manner in which warfare, diplomacy, business and a number of other areas are conducted. However, this radical transformation in the United States government with regard to IQ has not occurred over the last decade and a significant gap exists in the capability of the federal bureaucracy to support operations in this arena. While strategic policy and doctrine have been developed and promulgated, in most cases only by the Department of Defense, the actual conduct of IO activities and campaigns across the United States, are normally performed at a much more tactical level. This delta between theory and reality exists because the interagency organisations are often unwilling or unable to make the transformational changes that are needed to best utilise information as an element of power. In this research, the author has developed definitions and models that articulate not only why this delta exists, but also specific strategies for utilising IO in a manner by the United States federal organisations that best optimises the inherent capabilities of this element of power. Specific recommendations are noted below, and will be laid out in greater detail throughout the paper : Develop an Academic Theoretical Construct for IO; Understand that Different Approaches and Processes are Needed to Support IO; Establish an International IO Standards Effort & Meeting the IO Training Needs

    SDSC in the Nineties: A Difficult Transition

    Get PDF
    • …
    corecore