rna International Journal of Internet Protocol Technology By www.inderscience.com Published On :: Full Article
rna International Journal of Wireless and Mobile Computing By www.inderscience.com Published On :: Full Article
rna International Journal of Agile Systems and Management By www.inderscience.com Published On :: Full Article
rna International Journal of Data Mining and Bioinformatics By www.inderscience.com Published On :: Full Article
rna Blockchain powered e-voting: a step towards transparent governance By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 Elections hold immense significance in shaping the leadership of a nation or organisation, serving as a pivotal moment that influences the trajectory of the entity involved. Despite their centrality to modern democratic systems, elections face a significant hurdle: widespread mistrust in the electoral process. This pervasive lack of confidence poses a substantial threat to the democratic framework, even in the case of prominent democracies such as India and US, where inherent flaws persist in the electoral system. Issues such as vote rigging, electronic voting machine (EVM) hacking, election manipulation, and polling booth capturing remain prominent concerns within the current voting paradigm. Leveraging blockchain for electronic voting systems offers an effective solution to alleviate the prevailing apprehensions associated with e-voting. By incorporating blockchain into the electoral process, the integrity and security of the system could be significantly strengthened, addressing the current vulnerabilities and fostering trust in democratic elections. Full Article
rna Navigating the digital frontier: a systematic review of digital governance's determinants in public administration By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 The aim of the study is to examine the determinants of digitalisation in public sector. This research is particularly relevant as digital transformation has become a crucial factor in modernising public sector and enhancing service delivery to citizens. The method of the systematic literature review (SLR) was implemented by searching documents on the Scopus database. The initial research reached the 7902 documents and after specifying the keywords the authors found 207 relevant documents. Finally; after the careful read of their abstracts and the use of inclusion and exclusion criteria; the most cited and relevant 32 papers constituted the final sample. Findings highlighted the focus of the literature on technological factors such as the sense of trust and safety as well as the ease of use in the adoption of digital governance; emphasising the need for effective; trustworthy and user-friendly digital services. The most discussed internal factors were leadership and organisational culture. The study offers a deeper understanding of the factors that shape the successful implementation of digital governance initiatives. Full Article
rna International Journal of Electronic Governance By www.inderscience.com Published On :: Full Article
rna International Journal of Business Information Systems By www.inderscience.com Published On :: Full Article
rna International Journal of Technology Management By www.inderscience.com Published On :: Full Article
rna International Journal of Knowledge and Learning By www.inderscience.com Published On :: Full Article
rna Real World Project: Integrating the Classroom, External Business Partnerships and Professional Organizations By Published On :: Full Article
rna A Critical Analysis of Active Learning and an Alternative Pedagogical Framework for Introductory Information Systems Courses By Published On :: Full Article
rna Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming By Published On :: Full Article
rna International Journal of Electronic Security and Digital Forensics By www.inderscience.com Published On :: Full Article
rna International Journal of Business Innovation and Research By www.inderscience.com Published On :: Full Article
rna International Journal of Web Engineering and Technology By www.inderscience.com Published On :: Full Article
rna International Journal of Applied Systemic Studies By www.inderscience.com Published On :: Full Article
rna International Journal of Internet and Enterprise Management By www.inderscience.com Published On :: Full Article
rna Unravelling e-governance adoption drivers: insights from the UTAUT 3 model By www.inderscience.com Published On :: 2024-10-10T23:20:50-05:00 The study aims to unveil the various determinants that drive the adoption of e-governance services (EGS). Using the UTAUT 3 model, the research investigated these factors within the Indian context. A purposive sampling technique was utilised to collect the samples from 680 respondents through the online survey method. Furthermore, the study employs structural equation modelling (SEM) to examine the structural relationships between the UTAUT3 model's dimensions in the context of e-governance. Findings revealed that the UTAUT3 model adequately predicts the intention to adopt EGS. The present study addressed a significant gap in the literature on EGS and technology adoption by establishing a relationship between different dimensions of the UTAUT3 model and actual usage of EGS. The findings have implications for practitioners and policymakers as they throw light on the effective implementation of e-governance programs, which are essential for providing the citizens with high-quality services. Full Article
rna International Journal of Information Systems and Change Management By www.inderscience.com Published On :: Full Article
rna International Journal of Information Quality By www.inderscience.com Published On :: Full Article
rna International Journal of Computer Applications in Technology By www.inderscience.com Published On :: Full Article
rna International Journal of Teaching and Case Studies By www.inderscience.com Published On :: Full Article
rna International Journal of Business Intelligence and Data Mining By www.inderscience.com Published On :: Full Article
rna Constitutional and international legal framework for the protection of genetic resources and associated traditional knowledge: a South African perspective By www.inderscience.com Published On :: 2024-10-30T23:20:50-05:00 The value and utility of traditional knowledge in conserving and commercialising genetic resources are increasingly becoming apparent due to advances in biotechnology and bioprospecting. However, the absence of an international legally binding instrument within the WIPO system means that traditional knowledge associated with genetic resources is not sufficiently protected like other forms of intellectual property. This means that indigenous peoples and local communities (IPLCs) do not benefit from the commercial exploitation of these resources. The efficacy of domestic tools to protect traditional knowledge and in balancing the rights of IPLCs and intellectual property rights (IPRs) is still debated. This paper employs a doctrinal research methodology based on desktop research of international and regional law instruments and the Constitution of the Republic of South Africa, 1996, to determine the basis for balancing the protection of genetic resources and associated traditional knowledge with competing interests of IPLCs and IPRs in South Africa. Full Article
rna International Journal of Intellectual Property Management By www.inderscience.com Published On :: Full Article
rna International Journal of Information Technology and Management By www.inderscience.com Published On :: Full Article
rna International Journal of Technology Policy and Law By www.inderscience.com Published On :: Full Article
rna International Journal of Innovation and Learning By www.inderscience.com Published On :: Full Article
rna International Journal of Business and Systems Research By www.inderscience.com Published On :: Full Article
rna International Journal of Enterprise Network Management By www.inderscience.com Published On :: Full Article
rna International Journal of Networking and Virtual Organisations By www.inderscience.com Published On :: Full Article
rna Working in a Group before Meeting Face-to-Face – A Case of International Student Online Project By Published On :: Full Article
rna The Work Readiness of Master of Information Systems International Students at an Australian University: A Pilot Study By Published On :: Full Article
rna Design Alternatives for a MediaWiki to Support Collaborative Writing in Higher Education Classes By Published On :: Full Article
rna International Collaboration for Women in IT: How to Avoid Reinventing the Wheel By Published On :: Full Article
rna A Comparison Study of Impact Factor in Web of Science and Scopus Databases for Engineering Education and Educational Technology Journals By Published On :: Full Article
rna An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness By Published On :: 2021-06-03 Aim/Purpose: Board of Directors seek to use their big data as a competitive advantage. Still, scholars note the complexities of corporate governance in practice related to information security risk management (ISRM) effectiveness. Background: While the interest in ISRM and its relationship to organizational success has grown, the scholarly literature is unclear about the effects of Chief Technology Officers (CTOs) leadership styles, the alignment of the governance of big data, and ISRM effectiveness in organizations in the West-ern United States. Methodology: The research method selected for this study was a quantitative, correlational research design. Data from 139 participant survey responses from Chief Technology Officers (CTOs) in the Western United States were analyzed using 3 regression models to test for mediation following Baron and Kenny’s methodology. Contribution: Previous scholarship has established the importance of leadership styles, big data governance, and ISRM effectiveness, but not in a combined understanding of the relationship between all three variables. The researchers’ primary objective was to contribute valuable knowledge to the practical field of computer science by empirically validating the relationships between the CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness. Findings: The results of the first regression model between CTOs leadership styles and ISRM effectiveness were statistically significant. The second regression model results between CTOs leadership styles and the alignment of the governance of big data were not statistically significant. The results of the third regression model between CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness were statistically significant. The alignment of the governance of big data was a significant predictor in the model. At the same time, the predictive strength of all 3 CTOs leadership styles was diminished between the first regression model and the third regression model. The regression models indicated that the alignment of the governance of big data was a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness. Recommendations for Practitioners: With big data growing at an exponential rate, this research may be useful in helping other practitioners think about how to test mediation with other interconnected variables related to the alignment of the governance of big data. Overall, the alignment of governance of big data being a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness suggests the significant role that the alignment of the governance of big data plays within an organization. Recommendations for Researchers: While this exact study has not been previously conducted with these three variables with CTOs in the Western United States, overall, these results are in agreement with the literature that information security governance does not significantly mediate the relationship between IT leadership styles and ISRM. However, some of the overall findings did vary from the literature, including the predictive relationship between transactional leadership and ISRM effectiveness. With the finding of partial mediation indicated in this study, this also suggests that the alignment of the governance of big data provides a partial intervention between CTOs leadership styles and ISRM effectiveness. Impact on Society: Big data breaches are increasing year after year, exposing sensitive information that can lead to harm to citizens. This study supports the broader scholarly consensus that to achieve ISRM effectiveness, better alignment of governance policies is essential. This research highlights the importance of higher-level governance as it relates to ISRM effectiveness, implying that ineffective governance could negatively impact both leadership and ISRM effectiveness, which could potentially cause reputational harm. Future Research: This study raised questions about CTO leadership styles, the specific governance structures involved related to the alignment of big data and ISRM effectiveness. While the research around these variables independently is mature, there is an overall lack of mediation studies as it relates to the impact of the alignment of the governance of big data. With the lack of alignment around a universal framework, evolving frameworks could be tested in future research to see if similar results are obtained. Full Article
rna (GbL #1) Life Skills Developed by Those Who Have Played in Video Game Tournaments By Published On :: Full Article
rna External Variables as Antecedents of Users Perception in Virtual Library Usage By Published On :: 2016-05-04 Several studies extended the Technology Acceptance Model (TAM) by examining the antecedents of perceived usefulness and perceived ease of use; the present study looks at demographic aspect of external variables in virtual library use among undergraduate students. The purpose of this study is to identify the demographic factors sex, level of study, cumulative grade point average, and computer knowledge that act as external factors that are antecedents of perceived usefulness and perceived ease of use. The university management makes a large investment in the provision of a virtual library; investigation of the virtual library acceptance by students is important. TAM and theory of reasoned action (TRA) are utilised to theoretically test a model for the extension and to predict virtual library acceptance and usage. In a survey study, data was collected by using a structured questionnaire given to 394 randomly selected participants in a private university. Data were analysed by Pearson product moment correlation, multiple and hierarchical regression. The result of the study is consistent with TAM factors examined for explaining virtual library usage. The extension model accounts for 2.5% variance in perceived usefulness, 2.1% in perceived ease of use, 11.7% - 15.2% on intention to use and 7.2% on actual use of virtual library. Implications of the findings of the study on user’s virtual library training are discussed. Full Article
rna EO Model for Tacit Knowledge Externalization in Socio-Technical Enterprises By Published On :: 2017-03-21 Aim/Purpose: A vital business activity within socio-technical enterprises is tacit knowledge externalization, which elicits and explicates tacit knowledge of enterprise employees as external knowledge. The aim of this paper is to integrate diverse aspects of externalization through the Enterprise Ontology model. Background: Across two decades, researchers have explored various aspects of tacit knowledge externalization. However, from the existing works, it is revealed that there is no uniform representation of the externalization process, which has resulted in divergent and contradictory interpretations across the literature. Methodology : The Enterprise Ontology model is constructed step-wise through the conceptual and measurement views. While the conceptual view encompasses three patterns that model the externalization process, the measurement view employs certainty-factor model to empirically measure the outcome of the externalization process. Contribution: The paper contributes towards knowledge management literature in two ways. The first contribution is the Enterprise Ontology model that integrates diverse aspects of externalization. The second contribution is a Web application that validates the model through a case study in banking. Findings: The findings show that the Enterprise Ontology model and the patterns are pragmatic in externalizing the tacit knowledge of experts in a problem-solving scenario within a banking enterprise. Recommendations for Practitioners : Consider the diverse aspects (what, where, when, why, and how) during the tacit knowledge externalization process. Future Research: To extend the Enterprise Ontology model to include externalization from partially automated enterprise systems. Full Article
rna Understanding Internal Information Systems Security Policy Violations as Paradoxes By Published On :: 2017-01-17 Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful. Full Article
rna A Thematic Analysis of Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM) By Published On :: 2018-08-02 Aim/Purpose: This study investigates the research profile of the papers published in Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM) to provide silhouette information of the journal for the editorial team, researchers, and the audience of the journal. Background: Information and knowledge management is an interdisciplinary subject. IJIKM defines intersections of multiple disciplinary research communities for the interdisciplinary subject. Methodology: A quantitative study of categorical content analysis was used for a thematic analysis of IJIKM. One hundred fifty nine (159) papers published since the inauguration of the journal in 2006 were coded and analyzed. Contribution: The study provides synopsized information about the interdisciplinary research profile of IJIKM, and adds value to the literature of information and knowledge management. Findings: The analysis reveals that IJIKM disseminates research papers with a wide range of research themes. Among the research themes, Organizational issues of knowledge/information management, Knowledge management systems/tools, Information/knowledge sharing, Technology for knowledge/information management, Information/knowledge application represent the five main research streams of IJIKM. The total number of papers on organizational issues of knowledge/information management increased from 16% to 28% during the past 6 years. Statistical method was the most common research methodology, and summarization was the most common research design applied in the papers of IJIKM. The paper also presents other patterns of participant countries, keywords frequencies, and reference citations. Recommendations for Practitioners: Innovation is the key to information and knowledge management. Practitioners of information and knowledge management can share best practices with external sectors. Recommendation for Researchers: Researchers can identify opportunities of cross-disciplinary research projects that involve experts in business, education, government, healthcare, technology, and psychology to advance knowledge in information and knowledge management. Impact on Society: Information and knowledge management is still a developing field, and readers of this paper can gain more understanding of the dissemination of the literature of information and knowledge management involved in all relevant disciplines. Future Research: A longitudinal study could follow up in the future to provide updated and comparative information of the research profile of the journal. Full Article
rna Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector By Published On :: 2018-03-15 Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature. Full Article
rna Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa By Published On :: 2021-04-05 Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving. Full Article