...practice: A theoretical and empirical exploration of public e-procurement Catherine A. Hardy ⁎, Susan P. Williams Information Policy and Practice Research Group, Discipline of Business Information Systems, Faculty of Economics and Business, The University of Sydney, Sydney, NSW 2006, Australia Available online 19 April 2007 Abstract The purpose of this paper is to theoretically and empirically explore how public e-procurement policies are translated into practice. The theoretical argument draws on actor network theory (ANT), coupled with Colebatch’s [Colebatch, H. K. (2002). Policy (2nd ed.). Maidenhead, Open University Press.] social construct of policy, to analyze the actors, actions, and circumstances through which understanding of public e-procurement comes to stabilize (or not) into a coherent policy for action. Drawing on three case studies of central government agencies in Italy, Scotland, and Western Australia, we suggest new intellectual perspectives and methodological heuristics that may assist researchers and practitioners analytical efforts in examining sociotechnical change and the implications for policy development and implementation. © 2007 Elsevier Inc. All rights reserved. Keywords: E-government; E-procurement; Actor network theory; Social construction of policy 1. Introduction Public e-procurement, as an information system (IS) enabled innovation in government, is transforming technological platforms and the way governments in Western countries procure goods and...
Words: 12195 - Pages: 49
...Information Technology Strategic Planning Name: Institution: Date of Submmision: IT Strategic Plan for Jade Fashions Company Limited According to Evans (2002), strategic planning is an organizational management action used to lay down priorities, focus resources and energy and strengthen organization’s operations. The plan ensures that staff and other stakeholders share common goals in their work, establishes accord around intended results or outcomes, and reviews and adjusts the direction of the organization in reaction to any changing environment. It is a closely restricted effort that creates essential decisions and actions to help in shaping and guiding the identity of an organization, what it does, whom it serves, and why it does it, focusing on the future (Kim 2001). In agreement with Evan (2002), strategic planning entails a framework or structure, a set of procedures, and content. A strategic plan communicates the goals of the organization, the activities needed to attain those goals and all of the other significant elements of the planning exercise to the organization. This communication is measurable through a Balanced Score Card. According to Robert Kaplan and David Norton, the Balanced Score Card is a strategic planning and management system used to align business processess to the mission and vision statement of an organization, improve external and internal communications, and monitor the performance of the organization against its strategic goals. According...
Words: 3231 - Pages: 13
... Question 1: What does computer networking accomplish? Computer networking is the interconnection of two or more computers to share resources. Computer networking has evolved beyond the sharing of resources; it allows people and machines to communicate, using some of the advanced features or services. Computer networking has brought about increased productivity, cost reduction and synergy between users. Other accomplishments of the computer networks include: • File sharing and management: One of the major accomplishments of computer networking is file sharing, which includes remote file accessing. Organizations or individuals can share documents irrespective of their location provided their PCs are interconnected. It saves time, and provides a more efficient means of transferring data, rather than using storage device to copy and transport data to the other user. • Resource sharing and management: Another important achievement of computer networking is resource sharing. All computers in a network can share resources such as printers, modems, switches, scanners, and fax machines. Data can be...
Words: 3610 - Pages: 15
...THE IMPACT OF APPLICATION OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) IN THE ADMINISTRATION OF POLYTECHNICS IN OGUN STATE, NIGERIA BY SONEYE SEMIU ADEBAYO MATRIC NO: NOU100032296 A PROJECT SUBMITTED TO THE SCHOOL OF EDUCATION, NATIONAL OPEN UNIVERSITY OF NIGERIA, ABEOKUTA, IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF MASTERS DEGREE IN EDUCATION DECEMBER 2012 CERTIFICATION This is to certify that this research project entitled THE IMPACT OF APPLICATION OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) IN THE ADMINISTRATION OF POLYTECHNIC IN OGUN STATE, NIGERIA was carried out by SONEYE, Semiu Adebayo in the School of Education, National Open University of Nigeria Abeokuta for the award of Masters Degree in Education. _____________________ _____________________ DR. FOLAJIN, S.O. SIGNATURE / DATE PROJECT SUPERVISOR ________________________ _____________________ PROGRAMME LEADER SIGNATURE / DATE _____________________________ _____________________ PROF. BADMUS ADEMOLA SIGNATURE / DATE DEAN SCHOOL OF EDUCATION ________________________ _____________________ EXTERNAL EXAMINER SIGNATURE / DATE DEDICATION This research project is dedicated to the Holy Spirit, who has been the source of my inspiration. Also to my dependable wife, Mrs. Endurance Amishetu Adesayo Soneye and to my beloved children, Adebayo Soneye (Jnr.), Adedayo Soneye and Adetayo Soneye. To number one student of National open University...
Words: 10801 - Pages: 44
...E- Banking System in Pakistan ` E- Banking System in Pakistan Written by, Muhammad Rahimuddin rud777@hotmail.com 691205 0694 Syed Asif Abbas Bukhari asifbukhari82@hotmail.com 720512-1234 Supervised by Eva. Wittbom School of Management Blekinge Institute of Technology Ronneby, Sweden Thesis for the Master‟s degree in Business Administration, Spring-2010 Blekinge Institute of Technology, Ronneby, SWEDEN Thesis for the Master‟s degree in Business Administration Spring, 2010 I E- Banking System in Pakistan ABSTRACT Our this research work is based on the E-banking technology in which customers can access more accurate, quicker and rapid banking services from the computerized banking system. This system has also been adopted by the international banks as well as by the local banks in Pakistan to give efficient services to their elite customers. The purpose of our research work is carried out to unlock the significance that Pakistani banks are connected with this type of e-banking technology that is being implemented by the banks for providing the electronic services to the customers and in what extent this technology is relevant to customers. This research work will also help to determine whether the ebanking services are more efficient, accurate and rapid banking services. Thesis for the Master‟s degree in Business Administration, Spring-2010 Blekinge Institute of Technology, Ronneby, SWEDEN II E- Banking System in Pakistan SUMMARY ...
Words: 18788 - Pages: 76
...I am applying for admission to the Ph.D. program in Business Administration because I want a career in the research and teaching of management. In particular, I am interested in factors that affect the competitive performance of a business concern, and the manner in which changes in technology affect an organisation's structure, long-term business strategy, product development, manufacturing, supply chains, distribution network, information needs and standard systems. In order to gain an appreciation of these and related issues, it is essential for me to have a strong grounding in Economics, Supply Chain Management, and issues connected with Information Technology, as well as gain a General Management perspective. Review para1 I believe that the Ph.D. program in Business Administration (with concentration in Management) would be invaluable in helping me achieve these objectives. It would enable me to channel my quantitative and conceptual skills in analysing business issues and would open up new avenues in research. Subsequent to earning a Ph.D., I would like to apply for a faculty position at a leading university; and investigate issues concerned with technology as it affects organisation strategy, structure and systems. Review para2 I believe that my background in engineering and management has prepared me for such a career. I have found research fascinating since my engineering days, where I received the highest marks in the Department for my final-year undergraduate dissertation;...
Words: 1255 - Pages: 6
...only. Information subject to change at any time without prior notice. This whitepaper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, PowerShell, SharePoint, SoftGrid, Windows, Windows Media, the Windows logo, Windows Vista, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Table of Contents Table of Contents ii Introduction 1 Make Your Infrastructure More Efficient with Virtualization 1 Server Virtualization with Hyper-V 2 Presentation Virtualization with TS RemoteApp 3 Access Corporate Networks Remotely with Terminal Services 4 Terminal Services Gateway 4 Terminal Services Web Access 5 Single Sign-On 5 Hosting Secure Web Applications with Ease 6 Introduction 6 Built on a Proven and Trusted Platform 6 An Industrial Strength Web Server 7 Optimize by Running Only What You Need 7...
Words: 10609 - Pages: 43
...Association for Information Systems (Volume 15, 2004)713-729 713 INTRODUCING e-GOV: HISTORY, DEFINITIONS, AND ISSUES Åke Grönlund Örebro University, ake.gronlund@esi.oru.se Thomas A. Horan Claremont Graduate University, ABSTRACT The e-Gov field (also called Electronic Government, Digital Government, Electronic Governance, and similar names) emerged in the late 1990´s. Since then it spurred several scientific conferences and journals. Because the field grew considerably in size, both its contents and position with respect to other research fields and disciplines need to be explained and discussed. What is e-Gov? What is e-Gov research? What does it mean for the field of Information Systems? This paper briefly sketches the short eGov history and current status, and discusses the content of the field as it appears in current research. We conclude with a discussion of e-Gov as a research field of interest both as a new application area for IS theories and methods and as a source of new insight. Keywords: electronic government, governance I. INTRODUCTION The e-Gov (Electronic Government or Electronic Governance) field1 emerged in the late 1990´s as a context within which to share experiences among practitioners. Over the past few years eGov gave rise to several conferences with more and more scientific content. Some specialized journals now appear. Because the field grew to considerable size, both its contents and position with respect to other research fields and disciplines needs...
Words: 8545 - Pages: 35
...------------------------------------------------- 1. Introduction In order to ensure compatibility (conjugation) and information security, harmonization of existing and emerging government information systems and information resources, Government of the Republic of Kazakhstan dated January 16, 2004 N 44 "On the National operator in the field of Information of the Republic of Kazakhstan was introduced National Information Technologies Joint-stock Company was founded on April 4, 2000 called “NITEC” with 100% participation and foundation by government. The Company Mission is to facilitate the building up of reliable, efficient, and customer-focused public administration system through applying the state-of-the-art service-specific, organizational and information technologies. ------------------------------------------------- 2. Business Model of “NITEC” company The mission the company is to facilitate the building up of reliable, efficient, and customer-focused public administration system through applying the state-of-the-art service-specific, organizational and information technologies. 2.1 “NTIEC” products: 1. Consulting services. 2. Support of information system. 3. Project Management. 4. Automation workflow of Non-Profit Organizations 5. System technical support: * Technical support of the current...
Words: 950 - Pages: 4
...COM 540 Week #8 Course Project Saint Leo University Disaster Recovery Management COM-540-MBOL1 Contents Background 3 NIST SP 800-94 3 Intrusion Detection and Prevention Principles 4 Key Functions of IDPS Technologies 4 Detection Options 4 Types of IDPS Technologies 5 IDPS Technologies 5 Proper Installation 6 Testing and Deployment 6 Securing the IDPS 6 IDPS Updates 6 Building and Maintaining Skills – Additional Resources Required to Support 6 Using and Integrating Multiple IDPS Technologies 7 Review of the IDPS Marketplace 8 Comparison of IPS Products 9 Summary 9 Background The National Institute of Standards and Technology commonly known and referred to as NIST, is a government funded agency. NIST defines their mission statement as “NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.” (NIST General Information, 2014). NIST is involved in mostly every area of Information Technology from the latest Trusted Identity (Leithauser & Curran, 2012) standards formatting to the handling and processing of DNA (DNA research, 2013). In recent years the President of the United States signed a Memorandum implementing a Digital Government Strategy. The government recognizing mobile device vulnerabilities and the high risk of data loss assigned NIST to implement IDS and other security standards...
Words: 2456 - Pages: 10
...government agencies do business in the future? Virtualization Abstract: Server and application virtualization is a hot topic among many government information technology program managers. Today’s government agencies are focusing on reducing expenses while improving the capabilities that information technology provides its customers. This is a difficult task to accomplish with shrinking budgets. A key technology that can help reduce costs in multiple ways is virtualization. Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources. There are many advantages and disadvantages associated with virtualization. Each government agency that is considering virtualization needs to investigate both aspects and make the informed decision according to their business needs and their customers. Depending on the environment that some agencies operate in, virtualization may not be a logical or realistic choice for many of its information technology needs due to security policies that may be in effect. This is especially true within the intelligence community (IC) and Department of Defense (DoD) where they are required to keep different security classifications of data physically separated. Even though system security classification and policy effect government IT environments, the emergence of virtualization will change how government agencies initiate policies and standard...
Words: 3778 - Pages: 16
...hospital in a suitable of, which systems are beneficial in keeping personal within the loop. The hospital position to consolidate several divisions in applying ERP, CRM and KM. The ERP system exploits different administration divisions altogether managing data functioning with administration at supreme levels. The ERP system commonly uses the enterprise system (ES) on large-scale application software that supports business processes, data flows, and data analytics. The hospital abuses an assortment of networking methodologies in promoting different divisions within the company. Separate divisions incorporate their own requirements within the network to negotiate different functions. A balanced comprehension in combining different divisions, while also utilizing software applications within the department. An example of this, Radiology division the essentially utilizing variety electronic devices taking X-rays and processing the film. Expediting these conditions to doctors or medical staff data information is detrimental to the patient’s treatment. Daily functions in the transmission of data information to various departments is delayed. Radiology and Pharmacy departments rely on the capability ERP in providing an urgency in saving lives, while also maintaining data information between different divisions. Patton-Fuller Community Hospital Information Technology (IT) department employ’s variety of IBM systems in providing support their operating systems. The compatibility of these...
Words: 865 - Pages: 4
...alternative that best completes the statement or answers the question. 1) The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and: 1) _______ A) improved decision making. B) improved business practices. C) improved efficiency. D) improved flexibility. 2) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time? 2) _______ A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 3) An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support: 3) _______ A) decision making and control in an organization. B) the creation of new products and services. C) communications and data flow. D) managers analyzing the organization's raw data. 4) The three activities in an information system that produce the information organizations use to control operations are: 4) _______ A) information retrieval, research, and analysis. B) input, processing, and output. C) input, output, and feedback. D) data analysis, processing...
Words: 3444 - Pages: 14
...Describe how the development of integrated healthcare systems has created an impetus for installing computer networks. Glandon, Smaltz and Slovensky (2010) stated that integrated healthcare systems helped create the impetus for installing computer networks because information housed in one system may be “ incompatible with the data format” of information stored in another system. Information technology has an important and expanding role in the delivery of high quality healthcare services. Until recently health informatics systems have generally been developed as independent centralized databases. With computing communications technologies now being introduced into major hospitals, many new information services can now be provided to enhance the patient-care provider interaction. The main applications are the office suit and web-browsers. Most companies are moving toward web interface applications and internet explorer is the front runner for testing purposes. References Egan, G. (2005). Computers and networks in medical and healthcare systems. Glandon, G.L., Smaltz, D.H., & Slovensky, D.J. (2008). Austin and boxerman's Information systems for healthcare management (7th ed.). Chicago. Illinois: Health Administration Press. Suggest how the use of a patient ID bracelet containing a bar-code representation of the patient’s ID and a bar-code scanner can lead to improved quality of care in a hospital. new technology, such as patient ID and a bar-code scanner, allows the...
Words: 2311 - Pages: 10
...| Linux Security | A review of some current technologies | | | | | In the pre-Internet world you have criminals looking for “hard” assets: money, jewelry and other items that could be easily turned into hard currency. We have always had “white-collar” crime such as embezzlement, fraud and insider trading. With the proliferation of the Internet and our personal and professional lives stored in the cloud; criminals can now take one ubiquitous piece of information and turn themselves into a whole other person. The ease in which such information can be used has turned people who would never think of ever holding up a bank, mugging someone or other physical crime, into criminals. This type crime has spawned a whole new “industry”: cyber security. One of the most important aspects of a network administrator’s job is to secure the system from any person who wishes to do criminal activities. These people are both within and outside the organization. With the Linux system there are three main technologies that are in use today. They are SELinux, chroot jail, and iptables. The first line of defense in a Linux system is chroot jail. Chroot is a process or application that changes the root directory for a user. To the user it appears that they are in their root directory, but they are actually in a modified root directory. This modified root directory is called jail. Without a chroot jail, a user with limited file permissions would still be able to navigate...
Words: 942 - Pages: 4