• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 8
  • 8
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 168
  • 168
  • 72
  • 70
  • 56
  • 50
  • 35
  • 31
  • 30
  • 25
  • 24
  • 22
  • 20
  • 19
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Factors determining e-government security

Razzaqi, Hasan Ali January 2013 (has links)
E-Government security is a major area of concern that has the potential to affect the success of e-Government services across the world. Much of the literature has addressed this phenomenon by applying principles of computer science or engineering which tend to be objective. User concern of e-Government service security has not been addressed applying social science principles or management that tend to be subjective and have not been addressed in the literature. Objective research outcomes are unfortunately not suitable to address subjective factors. Further, user centric approach has not been adopted in most of the empirical studies that have dealt with e-Government security leading to lack of an understanding of how users perceive or feel or comprehend about e-Government services, particularly e-Government service security. Most of the research efforts addressing e-Government security have focused on either technological issues or engineering issues neglecting user perceptions and behavioural aspects. This disadvantage has led to possible reduction in the up-take of e-Government services. There was a need to have an in-depth understanding of user centric e-Government security and user centric factors that affect it as its antecedents addressing which it is possible to enhance user confidence in e-Government and hence its success. This research has addressed this partially. While addressing the concerns raised above, this research has defined and identified certain user centric factors that are required to examine the user centric nature of e-Government service security from the management and social sciences perspective. E-Government literature was critically reviewed to determine the user centric factors and their relationship to user centric e-Government security with the help of theories, models, concepts and frameworks that have not been applied so far. Contextual factors have been identified as important user centric ones that affect user centric e-Government security with e-Government technology chosen as the main contextual determinant of user centric e-Government security. User trust and user felt risk in using e-Government services were brought in as mediators of this relationship due to the prime importance these two user centric factors carry with regard to affecting the relationship between technology and user centric e-Government security. In addition demographic factors and culture (nationality) as a factor were applied to test their influence on the relationship between user trust and user centric e-Government security mediated by user felt risk to find whether they have any impact. Moderators (Human Computer Interaction (HCI), user privacy and web design quality) of this relationship were added to the investigation as literature showed that e-Government technology could not operate in isolation. Finally empirical outcomes of testing the above relationships were practically tested by examining the influence of perceived ease of use and usefulness on the relationship between user trust and user centric e-Government security mediated by user felt risk to find whether technology impacted users in reality. Theoretical framework was drawn from the literature review leading to a conceptual model that was used to answer the research question. 12 hypotheses were tested in all. The research was conducted in the Kingdom of Bahrain which ranks high in the implementation of e-Government (e.g. 14th ranked in the world in implementing e-participation in 2014 ranked by UN). The country offered a fertile ground for conducting research as the e-Government service provided were updated technologically constantly with the latest technological advancement cloud computing introduced in e-Government service provision. Most government services were offered now through e-Government services. The population was cosmopolitan and education levels of the users of e-Government were reasonably high providing a strong basis for conducting this research. Quantitative research method and survey questionnaire strategy were used. Users of e-Government services were the target population. Sampling procedure yielded 309 valid responses. Rigourous statistical analysis provided the findings. Except for 2 hypotheses the remaining were verified and established. Technology was found to determine user centric e-Government security with the mediation by trust being stronger than risk. HCI and web design quality moderated the relationship between technology and user centric e-Government security significantly. User education and experience were found to influence user trust and user centric e-Government security. User privacy and nationality were not found to be statistically significant. Perceived ease of use and usefulness of the technology were found to influence e-Government security mediated by trust and risk. This research was perhaps one of the first to have been conducted in a context where e-Government technology used cloud computing. The research contributed to the growing body of knowledge in the field of e-Government security that has viewed this phenomenon from the lens of social sciences and management. Theoretical contribution showed how the operationalization and relationship amongst the factors could be explained by expanding the application of theories including socio-technical, behavioural, managerial, technology adoption, organiational and HCI. Practical implications showed the usefulness of this research to users, service providers and policy makers involved with e-Government services. Methodologically this research has introduced a verification stage by which it has verified the theoretical results using practical outcomes.
32

Toward a unified model of electronic government adoption (UMEGA)

Rana, Nripendra P. January 2013 (has links)
No description available.
33

Administrative secrecy and the control of government information in Hong Kong

Hung Wong, Shun-chun, Dorothy., 洪黃順眞. January 1987 (has links)
published_or_final_version / Public Administration / Master / Master of Social Sciences
34

Accountability or secrecy: a study of the government's access to information policy

Tsang, Elsie., 曾芷詩. January 1996 (has links)
published_or_final_version / Public Administration / Master / Master of Public Administration
35

An analysis of the internet strategy of the Hong Kong Government

Lo, Shuk-yi., 勞淑儀. January 1999 (has links)
published_or_final_version / Public Administration / Master / Master of Public Administration
36

Accountability or secrecy : a study of the government's access to information policy /

Tsang, Elsie. January 1996 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1996. / Includes bibliographical references (leaf 101-107).
37

A study of accountability and open government in Hong Kong /

Guile, Andrea Mia Saturno. January 1995 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1995. / Includes bibliographical references (leaves 123-129).
38

A review of the access to information policy in Hong Kong /

Ma Mei-wah Iris. January 1998 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1998. / Includes bibliographical references.
39

A study of accountability and open government in Hong Kong

Guile, Andrea Mia Saturno. January 1995 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1995. / Includes bibliographical references (leave 123-129). Also available in print.
40

Accountability or secrecy a study of the government's access to information policy /

Tsang, Elsie. January 1996 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1996. / Includes bibliographical references (leaves 101-107). Also available in print.

Page generated in 0.1156 seconds