Search results

1 – 10 of over 15000
To view the access options for this content please click here
Article
Publication date: 1 March 2007

Paul Beynon‐Davies

This paper aims to present a meta‐model for electronic government (e‐government) which takes account of the broad nature of this contemporary socio‐technical phenomenon…

Abstract

Purpose

This paper aims to present a meta‐model for electronic government (e‐government) which takes account of the broad nature of this contemporary socio‐technical phenomenon. As such it contains within it a number of possible “business models” for the development of e‐government – strategies for e‐government focused around key business processes and information systems.

Design/methodology/approach

This meta‐model is built from literature taken from the domains of informatics, business and public administration. It is also built on established academic, policy and practitioner literature from the domain of e‐government itself.

Findings

The paper demonstrates and validates the use of this meta‐model in three ways. First, it is used as an explanatory tool to help review the contemporary experience of e‐government in the UK. To help in this process we position specific case examples of e‐government against the model from this experience. Second, it is used to evaluate a number of existing models of e‐government, particularly those which provide an explicit framework of e‐government progress. A number of deficiencies in such models are identified from this evaluation. Third, the meta‐model is proposed as a framework for evaluating and potentially benchmarking e‐government. The intention is to raise the perspective of evaluation and benchmarking in this area beyond its contemporary focus on electronic service delivery.

Originality/value

To demonstrate the worth of this approach, the paper describes the application of elements of this meta‐model in two evaluation/benchmarking exercises undertaken by the author in the context of regional e‐government.

Details

Transforming Government: People, Process and Policy, vol. 1 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

To view the access options for this content please click here
Book part
Publication date: 17 June 2019

Ahmed Abdullah, Gareth R. T. White and Brychan Thomas

This chapter discusses the use of an extended stage model for the evaluation of the adoption of e-business in small and medium-sized enterprises (SMEs). Empirical studies…

Abstract

This chapter discusses the use of an extended stage model for the evaluation of the adoption of e-business in small and medium-sized enterprises (SMEs). Empirical studies of e-business adoption are rare in Middle Eastern and developing countries and the chapter provides valuable insight into this region, by presenting an account of the use of the extended stage model to explore the level of e-business adoption among Yemeni SMEs.

In making this examination, the challenges and opportunities that accompany e-business adoption are revealed. The internal drivers and barriers, such as finance and skills, are recognised along with the external factors that include infrastructure and legislation. It also provides valuable insight into the macro-level sociopolitical determinants of e-business adoption that have not previously been appreciated; the study was undertaken during the Yemen Civil War in 2016.

Current adoption models imply that organisations adopt technologies in a linear fashion, gradually increasing complexity and capability. This study makes an important contribution by recognising that there are multiple points at which SMEs may ‘enter’ the technology-adoption ladder.

Details

Creating Entrepreneurial Space: Talking Through Multi-Voices, Reflections on Emerging Debates
Type: Book
ISBN: 978-1-78769-577-1

Keywords

To view the access options for this content please click here
Article
Publication date: 11 December 2017

Sebastian Stoermer, Samuel E. Davies, Oliver Bahrisch and Fedor Portniagin

Corporate business activities can require expatriates to relocate to dangerous countries. Applying the expectancy value theory, the purpose of this paper is to investigate…

Abstract

Purpose

Corporate business activities can require expatriates to relocate to dangerous countries. Applying the expectancy value theory, the purpose of this paper is to investigate differences in female and male expatriates in their relocation willingness to dangerous countries as a function of sensation seeking. The authors further examine money orientation as a moderator of the effects of sensation seeking.

Design/methodology/approach

The sample is comprised of 148 expatriates currently residing in safe host countries. The authors build and examine a moderated mediation model using the PROCESS tool.

Findings

The results show that male expatriates are more sensation seeking than female expatriates. Further, the results indicate a positive main effect of sensation seeking on relocation willingness to dangerous countries. Most importantly, sensation seeking was found to mediate the effects of gender on relocation willingness. Accordingly, male expatriates are more willing to relocate to dangerous countries due to higher sensation seeking. Money orientation was not found to interact with sensation seeking.

Research limitations/implications

The authors analyzed cross-sectional data. Future studies are encouraged to use multi-wave research designs and to examine further predictors, as well as mediators and moderators of relocation willingness to dangerous countries. Another limitation is the low number of organizational expatriates in the sample.

Practical implications

The study provides implications for the process of selecting eligible individuals who are willing to relocate to dangerous countries.

Originality/value

The study is among the first research endeavors to investigate antecedents of expatriates’ relocation willingness to dangerous countries. The authors also introduce the sensation seeking construct to the literature on expatriation management.

Details

Journal of Global Mobility, vol. 5 no. 4
Type: Research Article
ISSN: 2049-8799

Keywords

To view the access options for this content please click here
Article
Publication date: 24 April 2007

Paul Beynon‐Davies

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it…

Abstract

Purpose

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.

Design/methodology/approach

The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.

Findings

The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.

Research limitations/implications

In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.

Practical implications

The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.

Originality/value

This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.

Details

Journal of Enterprise Information Management, vol. 20 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article
Publication date: 1 January 1985

Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to…

Abstract

Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover specific articles devoted to certain topics. This Bibliography is designed to help. Volume III, in addition to the annotated list of articles as the two previous volumes, contains further features to help the reader. Each entry within has been indexed according to the Fifth Edition of the SCIMP/SCAMP Thesaurus and thus provides a full subject index to facilitate rapid information retrieval. Each article has its own unique number and this is used in both the subject and author index. The first Volume of the Bibliography covered seven journals published by MCB University Press. This Volume now indexes 25 journals, indicating the greater depth, coverage and expansion of the subject areas concerned.

Details

Management Decision, vol. 23 no. 1
Type: Research Article
ISSN: 0025-1747

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 1995

D Patel, E R Davies and I Hannah

Outlines research work [by the Machine Vision Group at Royal Holloway]into an x‐ray inspection system able to detect contaminants inpackaged food products. Describes the…

Abstract

Outlines research work [by the Machine Vision Group at Royal Holloway] into an x‐ray inspection system able to detect contaminants in packaged food products. Describes the analysis of a four‐stage machine vision structure that includes image formation, pre‐processing, feature extraction and decision. The system was tested on various food products and contaminants with the resultant conclusions that the contamination detection system was adaptive and worked with many types of products and contaminants. Refinements in the final decision making stage are being implemented by the use of expert [neural] networks.

Details

Sensor Review, vol. 15 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

To view the access options for this content please click here
Article
Publication date: 1 January 1935

With this number the Library Review enters on its ninth year, and we send greetings to readers at home and abroad. Though the magazine was started just about the time when…

Abstract

With this number the Library Review enters on its ninth year, and we send greetings to readers at home and abroad. Though the magazine was started just about the time when the depression struck the world, its success was immediate, and we are glad to say that its circulation has increased steadily every year. This is an eminently satisfactory claim to be able to make considering the times through which we have passed.

Details

Library Review, vol. 5 no. 1
Type: Research Article
ISSN: 0024-2535

To view the access options for this content please click here
Article
Publication date: 1 March 1997

J. Eric Davies

The development of information technology (IT) networks in the delivery of a range of material to learners in higher education is explored. Factors which influence the…

Abstract

The development of information technology (IT) networks in the delivery of a range of material to learners in higher education is explored. Factors which influence the application of IT are described and learner characteristics and needs are enumerated. The range of learning material appropriate to, and the mechanisms for, IT delivery are examined. Some examples of provision are noted. Strategic issues and the strengths and weaknesses of networked access are analysed. Prospects for developing systems and the requirements are discussed. The results of a small scale survey of provision in academic institutions are reported and discussed in a second part of the paper.

Details

The Electronic Library, vol. 15 no. 3
Type: Research Article
ISSN: 0264-0473

To view the access options for this content please click here
Article
Publication date: 1 August 1929

WE publish this issue on the eve of the Brighton Conference and our hope is that this number of The Library World will assist the objects of that meeting. Everything…

Abstract

WE publish this issue on the eve of the Brighton Conference and our hope is that this number of The Library World will assist the objects of that meeting. Everything connected with the Conference appears to have been well thought out. It is an excellent thing that an attempt has been made to get readers of papers to write them early in order that they might be printed beforehand. Their authors will speak to the subject of these papers and not read them. Only a highly‐trained speaker can “get over” a written paper—witness some of the fiascos we hear from the microphone, for which all papers that are broadcast have to be written. But an indifferent reader, when he is really master of his subject, can make likeable and intelligible remarks extemporarily about it. As we write somewhat before the Conference papers are out we do not know if the plan to preprint the papers has succeeded. We are sure that it ought to have done so. It is the only way in which adequate time for discussion can be secured.

Details

New Library World, vol. 32 no. 2
Type: Research Article
ISSN: 0307-4803

To view the access options for this content please click here
Article
Publication date: 1 July 2006

M. Webster, R. Beach and I. Fouweather

This paper sets out to discuss the development of an e‐business strategy by a UK soft drinks company. It is based within the Fast Moving Consumer Goods (FMCG) sector (also…

Abstract

Purpose

This paper sets out to discuss the development of an e‐business strategy by a UK soft drinks company. It is based within the Fast Moving Consumer Goods (FMCG) sector (also known as Consumer Packaged Goods), which is characterised by powerful retailers, tier‐1 suppliers of industrial end‐products and ingredient/raw material producers further upstream. The paper aims to examine the tensions created at tier‐1 level relating to the adoption of e‐business solutions for B2B activities.

Design/methodology/approach

The paper draws on the literature to describe the technological options for achieving e‐commerce, focusing particularly on Electronic Data Interchange (EDI) and internet‐mediated e‐commerce. It then explores the current uptake of e‐commerce, and the drivers and barriers that relate to its adoption. The theoretical issues identified are explored empirically using data gathered from a case study of Princes Soft Drinks. A detailed survey of organisations within its supply base was conducted in order to inform the development of its future e‐business strategy.

Findings

The results of the survey indicate a lack of enthusiasm among Princes' supply chain members for the adoption of e‐commerce generally and for internet‐mediated e‐commerce solutions in particular.

Research limitations/implications

The empirical survey is limited to the UK soft drinks sector and allows for the development of descriptive findings. These findings, discussed within the theoretical context of the paper, have potentially wider implications for the FMCG sector as a whole.

Practical implications

The work has significant implications for the development of Princes' e‐business strategy, and – by extrapolation – for other companies operating in similar commercial environments.

Originality/value

The paper reports original empirical research in the commercially important FMCG sector. Its value stems in part from the examination of the supply chain tensions created at tier‐1– between powerful e‐committed retailers and e‐reluctant industrial suppliers.

Details

Supply Chain Management: An International Journal, vol. 11 no. 4
Type: Research Article
ISSN: 1359-8546

Keywords

1 – 10 of over 15000