UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :thesis
Subject :HG Finance
Main Author :Alharmoodi, Badir Yousif Ahmed Rafee
Title :A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates
Place of Production :Tanjong Malim
Publisher :Fakulti Pengurusan dan Ekonomi
Year of Publication :2023
Corporate Name :Universiti Pendidikan Sultan Idris
PDF Guest :Click to view PDF file
PDF Full Text :Login required to access this item.

Abstract : Universiti Pendidikan Sultan Idris
This study aimed to investigate (a) the challenges due to lack of IT infrastructure, (b) the challenges of security and privacy, (c) the challenges associated with IT skills, (d) the knowledge of operating standards and protocols, and (e) the existing operational framework. This study employed a systematic review of previous literature by focusing on the challenges in and opportunities for a successful transition from egovernment to m-government. A survey questionnaire was used to gather the data relating to the study constructs from 250 respondents and the proposed framework was validated by the Fuzzy Delphi method. The survey data were analyzed using Chisquare test that showed the constructs of the study - IT infrastructure, security and privacy, IT skills, knowledge of operating standards and protocols, and operational frameworks - had significant effects on the transition from e-government to mgovernment based on the calculated χ2 values not exceeding the threshold value of 9.488 at the level of significance of .05. Therefore, the Fuzzy Delphi method showed there was a strong consensus of opinions among experts regarding the significance of the five constructs and their components, as evidenced by the high percentages of expert agreement ranging from 93% to 100%. These findings will have several implications that the stakeholders need to be aware of the inherent challenges in and opportunities for a successful transition of services from e- government to mgovernment, which can be better understood with the use of the framework developed in this study that highlights the critical parameters involved in such a transition and will enable governments to accomplish efficiency in service delivery to citizens and corporate entities through wireless information and communication as well as integrating various government department and personnel through mobile platforms.

References

Abramson, Mark & Means, E. Grady (Editors), (2017), E-government 2015. Rowman and Littlefield Publishers, Inc., New York. 

 

Abu-Shanab, E. (2017). Digital government adoption in Jordan: an environmental model. The International Arab Journal of e-Technology (IAJeT), 2(3), 129-135. 

 

Ackerman, M. S. (2019). Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing, 8(6), 430-439. 

 

Acquisti, A., Brandimarte, L. & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.  

 

Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2018). An XPath-based preference language for P3P. In Proceedings of the 12th international conference on World Wide Web (pp. 629-639). 

 

Aldosari, B., Al-Mansour, S., Aldosari, H., &Alanazi, A. (2018). Assessment of factors influencing nurses acceptance of electronic medical record in a Saudi Arabia hospital. Informatics in Medicine Unlocked, 10, 82-88. 

 

Al-Khouri, A. M. (2017). E-Government strategies the case of the United Arab Emirates (UAE). European Journal of ePractice, 17, 126-150.  

 

Almiani, M., Razaque, A., & Al Dmour, A. (2016). Privacy preserving framework to support mobile government services. International Journal of Information Technology and Web Engineering (IJITWE), 11(3), 65-78. 

 

Almarashdeh, I., &Alsmadi, M. (2016). Heuristic evaluation of mobile government portal services: An experts' review. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 427-431). IEEE. 

 

Aloudat, A., Michael, K., Chen, X., & Al-Debei, M. M. (2018). Social acceptance of location-based mobile government services for emergency management. Telematics and Informatics, 31(1), 153-171. 

 

Alruwaie, M., El-Haddadeh, R., & Weerakkody, V. (2017). A framework for evaluating citizens’ expectations and satisfaction toward continued intention to use e-government services. In International Conference on Electronic Government (pp. 273-286). Springer, Berlin, Heidelberg. Digital Government Society of North America. 

 

Al-Shboul, M., Rababah, O., Ghnemat, R., & Al-Saqqa, S. (2014). Challenges and factors affecting the implementation of e-government in Jordan. Journal of Software Engineering and Applications, 7(13), 1111. 

 

Alshehri, M., & Drew, S. (2010). E-government fundamentals. In IADIS international conference ICT. Society and human beings. 

 

Andam, ZR. (2018). E-Commerce and E-Business. http://www.apdip.net/publications/ 

 

Anic, I.-D., Budak, J., Rajh, E., Recher, V., Skare, V. & Skrinjaric, B. (2019).  Extended model of online privacy concern: what drives consumers’ decisions? Online Information Review, 43(5), 799-817. https://doi.org/10.1108/OIR-10-2017-0281. 

 

Antón, A. I., Bertino, E., Li, N., & Yu, T. (2016). A roadmap for comprehensive online privacy policy management. Communications of the ACM, 50(7), 109-116. 

 

Antón, A. I., Earp, J. B., He, Q., Stufflebeam, W., Bolchini, D., & Jensen, C. (2019). Financial privacy policies and the need for standardization. IEEE Security & privacy, 2(2), 36-45. 

 

Antovski, L., & Gusev, M. (2018). M-Government Framework. In Proceedings of the First European Conference on Mobile Government (pp. 36-44). Arabian Gulf: a vision toward reality.  

 

Atkinson, R.D. & Castro, D.D. (2019). Digital Quality of Life: Understanding the Personal and Social Benefits of the Information Technology Revolution.  

 

Anwar, G., & Abd Zebari, B. (2017). The relationship between employee engagement and corporate social responsibility: A case study of car dealership in Erbil, Kurdistan. International Journal of Social Sciences & Educational Studies, 2(2), 45. 

 

Arshad, F. (2019). Privacy fox-A JavaScript-based P3P agent for Mozilla Firefox. Privacy Policy, Law, and Technology, 17, 801-810. 

 

Badri, M. A., & Alshare, K. (2019). A path analytic model and measurement of the business value of e-government: An international perspective. International Journal of InformationManagement, 28(6), 524-535. 

 

Bain (2023) Business Process Reengineering: What Is Business Process Reengineering? 

 

Bakunzibake (2019) Improving the Implementation of e-Government services in Rwanda: Organizational perspective  

 

Bansal, et al. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. 

 

Basamh, S., Qudaih, H. & Suhaimi, M. (2014) E-government implementation in the Kingdom of Saudi Arabia: An exploratory study on current practices, obstacles & challenges. International Journal of Humanities and Social Science, 4, 296-300. http://www.ijhssnet.com/journals/Vol_4_No_2_Special_Issue_January_2014/30.pdf 

 

Beldad, A., de Jong, M., & Ateehoulder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behaviors, 26(5), 857–869. 

 

Blythe, S. E. (2016). The Dubai electronic transactions statute: A prototype for E-commerce law in the United Arab Emirates and the GCC countries. Journal of Economic and Administrative Sciences, 23(1), 1-23. 

 

Borade, G. (2010). Advantages of information technology. http://www.buzzle.com/ articles/advantages-of-information-technology.html.  

 

Burns, N., & Grove, S. K. (2015). Introduction to qualitative research. The practice of nursing research. Conduct, critique and utilization, 67-68. 

 

Carroll, J. (2017). 'What's in It for Me?': Taking M-Government to the People. In BLED 2017 Proceedings, 49. 

 

Charbaji, A., &Mikdashi, T. (2018). A path analytic study of the attitude toward e-government in Lebanon. Corporate Governance, 3(1), 76–82. 

 

Chellappa, R., & Sin, R. (2018). Personalization versus privacy: An empirical examination of the online consumer’s Dilemma. Information Technology and Management, 6, 181–202. 

 

Chow, W., & Angie, N. (2017). A study of trust in e-shopping before and after first-hand experience is gained. Journal of Computer Information Systems, 9(4), 125–130. 

 

CIO Council (2017). Government Use of Mobile Technology: Barriers, Opportunities and Gap analysis. Product of the Digital Services Advisory Group and Federal Chief Information Officers Council  

 

Coaker, B., & Deans, C. (2017). An Evaluation of US City Government Wireless Networks for Mobile Internet Access. In Mobile Government: An Emerging Direction in e-Government (pp. 357-374). IGI Global. 

 

Creswell, J. W. (2017). Research design: qualitative, quantitative, and mixed methods approaches (4th ed). SAGE Publications, Inc.  

 

Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., & Reagle, J. (2016). The platform for privacy preferences 1.0 (P3P1.0) specification. MIT/World Wide Web Consortium. http://www.w3.org/TR/P3P/ 

 

Cranor, L. F. (2018). P3P: Making privacy policies more useful. IEEE Security & Privacy, 1(6), 50-55. 

 

Cranor, L. F., Arjula, M., & Guduru, P. (2016). Use of a P3P user agent by early adopters. In Proceedings of the 2016 ACM workshop on Privacy in the Electronic Society (pp. 1-10). 

 

Cranor, L. F., Byers, S., & Kormann, D. (2018).  An analysis of P3P deployment on commercial, government, and children’s web sites as of May 2018. Washington, DC: Federal Trade Commission. 

 

Cranor, L., Dobbs, B., Egelman, S., Hogen, G., Humphrey, J., Langheinrich, M., & Reagle, M. (2017).. The Platform for Privacy Preferences 1.1 (P3P1. 1) Specification. World Wide Web Consortium, NOTE-P3P11-20171113, 13. 

 

Darwish, A.M (2019). Egypot:From e-Government to eGovernance. The Road to Fast Pace Development. ICEGOV. 

 

Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3). 319–340.  

 

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003.  

 

Davison, R. M., Wagner, C., & Ma, L. C. (2018). From E-Government Development Index. https://publicadministration.un.org/egovkb/en-us/Data-Center 

 

DeLone, W. H., & McLean, E. R. (2019). Measuring e-commerce success: Applying the DeLone & McLean information systems success model. International Journal of electronic commerce, 9(1), 31-47. 

 

Dinev, T., & Hart, P. (2017a). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29.  

 

Dinev, T., & Hart, P. (2017b). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. 

 

Directors General Responsible for Public Administration. (2018). Resolutions on e-government. http://www.csae.map.es/csi/pdf/ris_dg_egov_fi nal_eng.pdf.  

 

Dong, L., Mu, Y., Susilo, W., Wang, P., & Yan, J. (2011). A privacy policy framework for service aggregation with P3P. In The Sixth International Conference on Internet and Web Applications and Services (pp. 171-177). 

 

El-Kiki, T., & Lawrence, T. (2016). Emerging mobile government services: Strategies for Success. In 20th Bled eConference, eMergence: Merging and Emerging Technologies (pp. 1–12). Processes and Institutions. 

 

Esteves, J. & Joseph, R. C. (2019) A comprehensive framework for the assessment of eGovernment projects. Government Information Quarterly, 25(1), 118-132. 

 

Estevez, E., & Janowski, T. (2013). Electronic Governance for Sustainable Development—Conceptual framework and state of research. Government Information Quarterly, 30, S94-S109. 

 

European Institute of Public Administration. (2018). Organisational changes, skills and the role of leadership required by eGovernment. http://www.epractice.eu › Home ›Library.   

 

Evered, M., & Bögeholz, S. (2019). A case study in access control requirements for a health information system. In Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation-Volume 32 (pp. 53-61). 

 

Fang, Z. (2016). E-government in digital era: concept, practice, and development. International journal of the Computer, the Internet and management, 10(2), 1-22. 

 

Fasanghari, M., & Samimi, H. (2009). A Novel Framework for M-Government Implementation. In International Conference on Future Computer and Communication (ICFCC) (pp. 627-631). IEEE. 

 

Faruq, M., & Hartini, B. (2013). The moderating effect of technology awareness on the relationship between UTAUT constructs and behavioural intention to use technology: A conceptual paper. Australian Journal of Business and Management Research, 3(02), 14–23. 

 

Fischer (2020). Public Servants as Competent Practitioners of Knowledge Management. 

 

McClure, D. L. (2001). Electronic government: challenges must be addressed with effective leadership and management. General Accounting Office.  

 

Garofalakis, J. D., Stefani, A., Stefanis, V., & Xenos, M. N. (2007, July). Quality Attributes of Consumer-Based m-Commerce Systems. In ICE-B (pp. 130-136). 

 

Germanakos, P., Samaras, G., & Christodoulou, E. (2016).   Multi-Channel Delivery of E-Services in the Light of M-Government Challenge. In Mobile Government: An Emerging Direction in E Government (pp.292-317). Hershey, PA: IGI 

 

Ginosar, A. and Ariel, Y. (2017). An analytical framework for online privacy research: what is missing?  Information & Management, 54(7), 948-957. 

 

GovTech. (2009). Survey raises consumer online privacy awareness. Government Technology Magazines, Government Technology. 

 

Greene, S., &Kamimura, M. (2018). Ties that bind: Enhanced social awareness development through interactions with diverse peers. In Annual meeting of the association for the study of higher education. Portland: Oregon. 

 

Greunz, M., Schopp, B., &Haes, J. (2015, January). Integrating e-government infrastructures through secure XML document containers. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (pp. 10-pp). IEEE. 

 

Gunadi, G., & Sandy, G. A. (2009). A formal model for electronic and mobile government service delivery success factors. 

 

Hair, J., Anderson, R., Tatham, R., & Black, W. (1998). Multivariate Data Analysis. Prentice Hall, Upper Saddle River, NJ.  https://newzoo.com/insights/rankings/top-50-countries-by-smartphone-penetration-and-users/international perspective. International Journal of Information 

 

Hassan, M., Jaber, T., & Hamdan, Z. (2019). Adaptive mobile-government framework. In  Proceedings of the International Conference on Administrative Development: Towards Excellence in Public Sector Performance,  

 

Harvey, N., & Holmes, C.A. (2017) Nominal group technique: An effective method for obtaining group consensus. International Journal of Nursing Practice 18, 188 -194 

 

Heeks, R. (2018). Success and Failure Rates of eGovernment in Developing/Transitional Countries: Overview. University of Manchester.  http: www.egov4dev.org/sfoverview.htm 

 

Hossain, M. S., Samakovitis, G., Bacon, L., & MacKinnon, L. (2015). A conceptual framework for design of mobile governance in developing countries: The case of Bangladesh. In 2015 18th International Conference on Computer and Information Technology (ICCIT) (pp. 161-166). IEEE. 

 

Holden, SH. (2021). The evolution of information technology management at the federal level: implications for public administration. In Garson, GD (ed), Information technology and computer applications in public administration: issues and trends. IDEA Group Publishing. 

 

Hussain, M. (2017). M-government Implementation: A Comparative Study between a Developed and a Developing Country. Doctoral dissertation, The University of New South Wales, Canberra, Australia. 

 

Ibiene (2020) Information and Communication Technology (ICT) Skills and Efficient Management of Educational Resources in Public Secondary Schools 

 

ICT Skills Monitoring Group (2016). E-business and ICT skills in Europe. http://www. ec.europa.eu/enterprise/sectors/ict/fi les/synthesis-report-v1_en.pdf.  

 

Karlof, C., Sastry, N., & Wagner, D. (2019). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 162-175). 

 

Kelly, P., Bresee, J., Cranor, L., & Reeder, R. (2009). A `Nutrition Label` for privacy. In Symposium on usable privacy and security (SOUPS) (pp 4:1-4:12). ACM, Mountain View, CA.   

 

Khurat, A., Gollmann, D., &Abendroth, J. (2010). A formal P3P semantics for composite services. In Workshop on Secure Data Management (pp. 113-131). Springer, Berlin, Heidelberg. 

 

Kim, Y., Yoon, J., Park, S., & Han, J. (2019). Architecture for implementing the mobile government services in Korea (pp. 601–612). Conceptual Modeling for Advanced Application Domains. doi:10.1007/978- 3-540-30466-1_55 

 

Kim, M., & Ahn, J. (2017). Comparison of trust sources of an online market-maker in the e-marketplace: Buyer’s and seller’s perspectives. Journal of Computer Information Systems, 47(1), 84–94. 

 

Kolding, M. & Kroa, V. (2016). E-Skills – the key to employment and Inclusion in Europe. http://www.download.microsoft.com/.../f/2/b/.../IDC-White-Paper-ESkills.pdf.  

 

Kolter, J., & Pernul, G. (2009). Generating user-understandable privacy preferences. In 2009 International Conference on Availability, Reliability and Security (pp. 299-306). IEEE. 

 

Kostopoulos, G. K. (2018). E-government in the Arabian Gulf: a vision toward reality. In Proceedings of the 2018 annual national conference on Digital government research (pp. 1-7). Digital Government Society of North America.  

 

Kotze, H. J. N. (1985). Belangrikheid van ter sake inligting wat betydsaanmunisipalebesluitnemersbeskikbaargestelmoet word. Simposium van munisipaleraadsledeenamptenare: vernuwing met samewerking.  

 

Kumar, (2019). Locking the door but leaving the computer vulnerable: Factors inhibiting home users’ adoption of software firewalls. Decision Support Systems, 9(1), 254–264. 

 

Kushchu, I., & Kuscu,  H. (2018).  From E-government to M-government: Facing the Inevitable.  In the 3rd European Conference on e-Government. MCIL Trinity College Dublin Ireland 

 

Kushchu, I., Arat, S., & Borucki, C. (2016). The Impact of M-Government on Organisations: A Mobility Response Model. In Mobile Government: An Emerging Direction in E Government (pp.134-154). Hershey, PA: IGI 

 

Lallan, E. (2009, June 24). eGovernment for Development, M-Government Definitions and Models. Management, 28(6), 524-535. http://www.egov4dev.org/mgovdefn.htm  

 

Lee, M.-C. (2009b). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130–141. 

 

Lee, Y.-C. (2018). Will self-regulation work in protecting online privacy? Online Information Review, 27(4), 276-283.  

 

Linda & Roy (2022) What is strategic management? Strategic management is the ongoing planning, monitoring, analysis and assessment 

 

Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review. Communications of the Association for Information Systems. 

 

Liao. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications, 10(6), 702–715. 

 

Liu, Y. (2012). A unified risk-benefit analysis framework for investigating mobile payment adoption. In 2012 International Conference on Mobile Business. 

 

Lowry, P., Cao, J., & Everrard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the sue of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200. 

 

Lwin, M., Wirtz, J. & Williams, J.D. (2016). Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585. 

 

Magdy, Y. (2018). The Adoption of Mobile Government Services in Developing Countries: The Case of Egypt. International Journal of Information and Communication Technology Research, 2(4), 333-341 

 

McClure, D. (2015), GAO (General Accounting Office). Electronic government: challenges must be addressed with effective leadership and management. http://feapmo.gov/ links.asp 

 

MacCarthy, M. (2014). Student privacy: Harm and context. International Review of Information Ethics, 21, 11–24. 

 

Marié, Smuts, Matthee & Yogesh (2020). An e-Government implementation framework: A Developing Country Case study. doi: 10.1007/978-3-030-45002-1_2 

 

Mar, C. (2010). Privacy Bird for chrome. School of Computer Science, Carnegie Mellon University, Pittsburgh, Tech. Rep, 19-608. 

 

Martínez-Ballesté, A., Pérez-Martínez, P. A., & Solanas, A. (2013). The pursuit of citizens' privacy: a privacy-aware smart city is possible. IEEE Communications Magazine, 51(6), 136-141. 

 

May, M. J., Gunter, C. A., Lee, I., &Zdancewic, S. (2009). Strong and weak policy relations. In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks (pp. 33-36). IEEE. 

 

McDonald, A. M., Reeder, R. W., Kelley, P. G., & Cranor, L. F. (2009). A comparative study of online privacy policies and formats. In International Symposium on Privacy Enhancing Technologies Symposium (pp. 37-55). Springer, Berlin, Heidelberg. 

 

Mensah & Zeng (2020). E-Government Services Adoption: An Extension of the Unified Model of Electronic Government.  doi.org/10.1177/2158244020933593  

 

Miller (2020). Overcoming smallness: Qatar, the United Arab Emirates and strategic realignment in the Gulf 

 

Miller, T., Kim, R.H., Fewlner, E.J., Antony, B.K., Bryan, B.K., & James, M.R., (2013). Index of Economic Freedom (pp. 300-305). 

 

Monette, S., Trépanier, G., &Bigras, M. (2018). Executive functions in preschoolers: An exploratory study with recent tasks. Poster submitted for presentation at the 2011 convention of the Society for Research in Child Development, Montreal, Quebec 

 

Mukherjee, A., & Biswas, A. (2018). Simple implementation framework for m-government services. In International Conference on Mobile Business (ICMB) (pp. 288). IEEE. 

 

Mulligan, D.K., Koopman, C. & Doty, N. (2016). Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy. Philosophical Transactions of The Royal Society A Mathematical Physical and Engineering Sciences, 374 (2083), 1-17. 

 

Mutimukwe & Ella (2019). Information privacy practices in e-government in an African least developing country. Rwanda 

 

Nasser (2017). M-Government adoption factors in the UAE: a partial least squares approach Project. Smart government, M-government (e-government using the emerging technologies) adoption in the UAE 

 

Ndou, V. (2019). E-government for developing countries: opportunities and challenges. The Electronic Journal on Information Systems in Developing Countries, 18(1), pp.1-24 

 

Neuman, W. L. (2011). Social Research Methods: Qualitative and Quantitative Approaches. USA: Allyn and Bacon. 

 

Newzoo's Global Mobile Market Report, (2017). Retrieved from: https://newzoo.com/insights/rankings/top-50-countries-by-smartphone-penetration-and-users/ 

 

Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press. 

 

Northrop, A. (2021). The challenge of teaching information technology in public administration graduate programs. In Information technology and computer applications in public administration: Issues and trends (pp. 1-22). IGI Global.  

 

Obiria, P. B., & Kimwele, M. W. (2017). A location-based privacy-preserving m-learning model to enhance distance education in Kenya. Journal of Computers in Education, 4(2), 147-169. 

 

O’Brien (2020). Balancing the contradictions of UAE’s data privacy laws businesses in the UAE must respect the law while protecting users. 

 

OECD/International Telecommunication Union (2011). M-Government: Mobile Technologies for Responsive Governments and Connected Societies. OECD Publishing. http://dx.doi.org/10.1787/9789264118706-en and ITU Bookshop at www.itu.int/pub/D-STR/m-gov 

 

Okazaki, S., Hairong, L., &Morikazu, H. (2009). Consumer privacy concerns and preferences for degree of regulatory control. Journal of Advertising, 38(4), 63–77. 

 

Office of Management and Budget (2016). E-government strategy. http://www.cio.gov/documents/EgovStrategy.html 

 

Organisation for Economic Cooperation and Development (2016). Measuring the information economy. ICT in education and government. http://www.oecd.org/ 

 

Osah, O., & Kyobe, M. (2017). Predicting user continuance intention towards M-pesa in Kenya. African Journal of Economic and Management Studies. 

 

Oui-Suk, U. (2010). Introduction of m-Government & IT Convergence Technology. Working document, KAIST Institute for IT Convergence,  Daejeon, Republic of Korea. 

 

Pan, Y., & Zinkhan, G. (2017).  Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331–338. 

 

Pandey. K. R., & Sekhar, K. S. V. (2013). From e-Governance to m-Governance: The way forward. e-Govt -Technological Framework, 1–9 

 

Pawel (2020). Usability of Mobile Applications: A Systematic Literature Study DOI: 10.1109/ACCESS.2020.2981892 

 

Polit, D. F., & Beck, C. T. (2018). Nursing research: Generating and assessing evidence for nursing practice (7th ed.). Philadelphia: Wolters Kluwer Health, Lippincott Williams & Wilkins. 

 

Polit, D.F., Beck, C.T. & Hungler, B.P. (2015), Essentials of Nursing Research: Methods, Appraisal and Utilization (5th Ed). Philadelphia: Lippincott Williams & Wilkins. 

 

Pollach, I. (2016). What's wrong with online privacy policies? Communications of the ACM, 50(9), 103-108. 

 

Qader, N. N., & Kheder, M. Q. (2016). Challenges and Factors affecting the implementation of e-Government in Iraq. Journal of University of Human Development, 2(3). 

 

Reagle, J., & Cranor, L. F. (2021). The platform for privacy preferences. Communications of the ACM, 42(2), 48-55. 

 

Reidenberg, J. R., & Cranor, L. F. (2016). Can user agents accurately represent privacy policies? Available at SSRN 328860. 

 

Rich & Steven (2021). Continue Reading About information technology (IT) 

 

Rogers, E. M. (1995). Diffusion of innovations (4th ed.). New York, Free Press. 

 

Sharma & J. Gupta (2019). Web services architecture for m-government: issues and challenges. Electronic Government. An International Journal, 1(4), 462-474.  

 

Shneiderman, B., & Plaisant, C. (2010). Designing the User Interface: Strategies for Effective Human-Computer Interaction (5th edition). New York: Pearson. 

 

Singh, S. (2015). Promoting e-Governance through Right to Information: a case study of India. International Journal of Scientific & Engineering Research, 1(2). 

 

Song, G. (2018). Transcending e-Government: a case of mobile government in Beijing. In The First European Conference on Mobile Government. Brighton 

 

Srivastava, S. C., & Teo, T. S. (2016). E-government payoffs: Evidence from cross-country data. Journal of Global Information Management (JGIM), 15(4), 20-40. 

 

Tair, H. Y. A., & Abu-Shanab, E. A. (2014). Mobile Government Services: Challenges and Opportunities. International Journal of Technology Diffusion (IJTD), 5(1), 17-25.  

 

Turoff, M. (2016). The Policy Delphi. In H. Linstone& M. Turoff (Eds.) The Delphi method (pp.80–96). http://is.njit.edu/pubs/delphibook 

 

UN Millennium Project (2018). Innovation: Applying Knowledge in Development. UN Task Force on Science, Technology, and Innovation, New York. 

 

Varian, H.R., Farrell, J. & Shapiro, C. (2018). The Economics of Information Technology. New York: Cambridge University Press. 

 

Vaudenay, S. (2017).  A classical introduction to cryptography: Applications for communications security. Springer Science & Business Media. 

 

Weerakkody, V., Janssen, M &Hjort-Madsen, K. (2016). Integration and Enterprise Architecture Challenges in E-Government: A European Perspective. International Journal of Cases on Electronic Commerce, 3, 13-35. 

 

Westin, A. (1967). Privacy and freedom. New York: Antheneum. 

 

Whaiduzzaman, M., Hossain, M. R., Shovon, A. R., Roy, S., Laszka, A., Buyya, R., & Barros, A. (2020). A privacy-preserving mobile and fog computing framework to trace and prevent covid-19 community transmission. IEEE Journal of Biomedical and Health Informatics, 24(12), 3564-3575. 

 

World Bank (2016). World Development Report 2016: Digital Dividends. World Bank, Digital Adoption Index 2016. 

 

Xu, H., Teo, H.-H., Tan, B.C. and Agarwal, R. (2012). Research note – effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research, 23(4),1342-1363.  

 

Xu, H., Teo, H.-H., Tan, B.C. & Agarwal, R. (2012). Research note –effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research, 23(4),1342-1363. 

 

Yao, M.Z. & Zhang, J. (2019). Predicting user concerns about online privacy in Hong Kong. Cyber Psychology & Behaviour, 11(6), 779-781. 

 

Yao, M.Z., Rice, R.E. & Wallis, K. (2016). Predicting user concerns about online privacy. Journal of the Association for Information Science and Technology, 58(5), 710-722. 

 

Yu, T., Li, N., & Antón, A. I. (2019). A formal semantics for P3P. In Proceedings of the 2019 workshop on Secure web service (pp. 1-8). 

 

Zafar, A., Hasan, S., & Trigui, M. (2014). Towards secure m-Learning: An analysis. MAGNT Research Report (ISSN. 1444-8939) 2(5), 148–159. 

 

 

 

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries with this repository, kindly contact us at pustakasys@upsi.edu.my or Whatsapp +60163630263 (Office hours only)