e-Infrastructure and e-Services for Developing Countries

There is a shortage of e-Government research from a citizen-centric perspective within the African continent. Focus has been on how governments can improve service delivery by being efficient and effective. Arguably, the focus of e-Government research appears inspired by the New Public Management theory that aims to import private sector operations into the public sector. While benefits can be drawn from this approach, governments appear to fail to completely play their role of generating public value among citizens. The focus on government’s view on e-Government often short charge the citizens who are expected to adopt and use e-Government. This paper adds to the body of knowledge by proposing a model for citizen centric e-Government that is suitable for Namibia.

[1]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[2]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[3]  Luis Guijarro,et al.  Interoperability frameworks and enterprise architectures in e-government initiatives in Europe and the United States , 2007, Gov. Inf. Q..

[4]  Gurvirender P. Tejay,et al.  Building a better password: The role of cognitive load in information security training , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.

[5]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..

[6]  Byoungsoo Kim The diffusion of mobile data services and applications: Exploring the role of habit and its antecedents , 2012 .

[7]  Rashid N. Khan,et al.  Business Process Management: A Practical Guide , 2004 .

[8]  William D. Wunderle,et al.  Through the Lens of Cultural Awareness: A Primer for US Armed Forces Deploying to Arab and Middle Eastern Countries , 2006 .

[9]  Elske Ammenwerth,et al.  Evaluation of health information systems - problems and challenges , 2003, Int. J. Medical Informatics.

[10]  Sven C. Voelpel,et al.  Managing knowledge sharing in China: the case of Siemens ShareNet , 2005, J. Knowl. Manag..

[11]  John A. Zachman,et al.  A Framework for Information Systems Architecture , 1987, IBM Syst. J..

[12]  Elmarie Kritzinger,et al.  Cyber security for home users: A new way of protection through awareness enforcement , 2010, Comput. Secur..

[13]  Naoufel Kraiem,et al.  Developing a service oriented E-government architecture towards achieving E-government interoperability , 2014 .

[14]  P. Seibert,et al.  A checklist to facilitate cultural awareness and sensitivity , 2002, Journal of medical ethics.

[15]  Harry Bouwman,et al.  An organizational competence model for innovation intermediaries , 2014 .

[16]  P. Drucker The discipline of innovation. , 1998, Harvard business review.

[17]  Sean B. Maynard,et al.  Embedding Information Security Culture Emerging Concerns and Challenges , 2010, PACIS.

[18]  Sanjiva Weerawarana,et al.  Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI , 2002, IEEE Internet Computing.

[19]  Joon Koh,et al.  A Comparison of Online Trust Building Factors between Potential Customers and Repeat Customers , 2004, J. Assoc. Inf. Syst..

[20]  E. Sadler‐Smith,et al.  Knowledge‐based services and the Internet: an investigation of small UK accountancy practices , 2002 .

[21]  Stevan Mrdalj,et al.  A comparison of enterprise architecture frameworks , 2006 .

[22]  Stephen Flowerday,et al.  An assessment of the role of cultural factors in information security awareness , 2011, 2011 Information Security for South Africa.

[23]  Yolanda Polo-Redondo,et al.  Antecedents and consequences of e-business use for European retailers , 2012, Internet Res..

[24]  Pavel Shvaiko,et al.  E-Government Interoperability Framework: A Case Study in a Developing Country , 2010 .

[25]  Shumaila Y. Yousafzai,et al.  Strategies for Building and Communicating Trust in Electronic Banking: A Field Experiment , 2005 .

[26]  Marcus A. Butavicius,et al.  Human Factors and Information Security: Individual, Culture and Security Environment , 2010 .

[27]  Barrack Okello,et al.  EFFECT OF STAFF TRAINING ON LEVEL OF COMPLIANCE TO PUBLIC PROCUREMENT SYSTEM IN PARASTATALS IN KENYA , 2015 .

[28]  Thilini Ariyachandra,et al.  Critical Success Factors in Business Performance Management—Striving for Success , 2008, Inf. Syst. Manag..

[29]  Stephanie D. Hight The importance of a security , education , training and awareness program ( November 2005 ) , 2005 .

[30]  Kevin F. McCrohan,et al.  Influence of Awareness and Training on Cyber Security , 2010 .

[31]  Rudolf R. Sinkovics,et al.  The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .

[32]  Philip E. T. Lewis,et al.  Research Methods for Business Students (5th edn) , 2007 .

[33]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[34]  Christine Legner,et al.  EA frameworks, modelling and tools , 2012 .

[35]  Grace A. Lewis,et al.  Interoperability in the e-Government Context , 2012 .

[36]  Brian H. Cameron,et al.  Analyzing the Current Trends in Enterprise Architecture Frameworks , 2013 .

[37]  Jan H. Kroeze,et al.  The Role of ICT within Small and Medium Enterprises in Gauteng. , 2011 .

[38]  Marios Koufaris,et al.  The development of initial trust in an online company by new customers , 2004, Inf. Manag..

[39]  Saudi Arabia,et al.  Information Security Awareness and Culture , 2012 .

[40]  F. Aloul The Need for Effective Information Security Awareness , 2011 .

[41]  Tao Zhou,et al.  An Empirical Examination of Initial Trust in Mobile Banking , 2011, Internet Res..

[42]  e-Government Implementation in Nepal , 2007 .