150,365 research outputs found
Recommended from our members
The role of trust in e-government adoption: A systematic literature review
Electronic government (e-government) is a concept that has been adopted in most countries for the
purposes of providing government services digitally, improving transparency between government and
citizens and enabling additional communication channels with the government. Although e-government
readiness in most countries is at a high level, adoption of e-government services is still considered
tentative. A critical review of the literature suggests that this may be linked to citizens’ trust in
government and e-government. As such, there is a need to investigate the role of trust in e-government
adoption. For this purpose, a systematic literature review was conducted in order to observe research
design, methodologies and approaches adopted in these studies as well as limitations identified and
recommendation for future studies. The findings highlight that quantitative techniques and survey
research methods appear to have been much preferred over other available alternatives such as qualitative
techniques and interview methods or mixed methods in studies relating to trust in e-government
adoption
Spirituality in Knowledge Management: Systematic Literature Review and Future Studies Suggestions
Knowledge Management has established itself as key to the competitive advantage of companies in the 21st century. As the mere accumulation of knowledge is insufficient, there is a corresponding need to control and supervise interactions across the organization so as to create organisational value. Thus, understanding how the composition of the main knowledge management constructs and what influences them is especially important. Sharing knowledge, a continuous process and key to creating value, has mutual trust as one of its antecedents. We here consider trust as the amount that a person is willing to impute good intentions and believe in the discourses and actions of others (Cook and Wall, 1980). This research seeks to understand whether spirituality amounts to a factor influencing the confidence and trust necessary for the sharing of organisational knowledge. Studies indeed defend spirituality as a factor promoting trust, feelings of mutuality as well as a factor generating control over negative impulses, for internal improvement, unity and interconnections among organisational members (Pawar, 2017; Tejeda, 2015; Duchon & Plowman, 2005; Mitroff & Denton, 1999). This relationship is both relevant and worthy of deeper exploration as both knowledge management and spirituality are fundamental to creating organisational value. We opted to undertake a systematic review of the literature in order to understand just which links among the constructs feature in the literature. Therefore, we made automatic searches on Web of Knowledge and EBSCO databases. Our results suggest that spirituality positively influences knowledge sharing, because it is a relevant factor itself, either in the actual sharing or indirectly through its influence over knowledge creation. However, we would emphasise that there are almost no articles interlinking these two constructs and hence the need to deepen research into this factor and improve our understanding of its influence in organisations and therefore also propose the application of different methodologies to advance studies on this subject.info:eu-repo/semantics/publishedVersio
Security and computer forensics in web engineering education
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security should be an integral part of a Web Engineering curriculum. One aspect of Computer forensics investigates failures in security. Hence, students should be aware of the issues in forensics and how to respond when security failures occur; collecting evidence is particularly difficult for Web-based applications
Intangible trust requirements - how to fill the requirements trust "gap"?
Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements
per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'.
Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms
and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements
What is the future for undergraduate dissertations?
This article argues that the changing nature of the dissertation experience, and its associated supervision calls for more detailed attention to the development of dissertation supervisors. Dissertations have always played a major role in student learning. The following themes constitute the kernel of the article: the role of the dissertation in the student’s learning experience, managing the link between theory and practice, digitization of information resources, research methodologies and design, and finally, the implications for the role of the supervisor. It is suggested that without an awareness of the changing nature of the dissertation experience, and a more proactive approach to supervisor development, there may be serious degradation of the dissertation experience and outcomes.</p
Blogging as a viable research methodology for young people with arthritis: a qualitative study.
The development of services that are responsive to the needs of users is a health policy priority. Finding ways of engaging young people in research to gain insights into their particular experiences, perspectives, and needs is vital but challenging. These data are critical to improving services in ways that meet the needs of young people
Recommended from our members
Towards a methodology for the development of integrated IT infrastructures
In this paper, the authors propose and validate
a methodology for the development of integrated
Information Technology (IT) infrastructures. The
motivation for putting forward a new methodology is
grounded on the limitations of the various software
engineering methodologies (traditional) that exist
today. Despite that the traditional methodologies result
in the development of Information Systems (IS) from
scratch, Enterprise Application Integration (EAI)
builds integrated IT infrastructures using existing
applications. This significant difference is associated
with many issues needed to be realised and addressed
like: (a) the changes that such an infrastructure brings
to organisations, (b) the resistance to change and (c)
the extension of IS lifecycle’s. The proposed
methodology consist of eight stages and aims at
supporting software engineers, organisations and
researchers to build integrated IT infrastructures. As a
result the methodology seeks to contribute to the body
of knowledge
- …