The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tourism is closely connected with mobile activities. People go the tourism attractions by doing mobile within city or even country. As a tourist, mobility means put some risk for the convenience of sightseeing. For example, when the visitor visits the attractions might feel uncomfortable because crowd of people, closed attractions, or meaningless unguided tour. This paper describes an alternative...
This article presents a conceptual model of a new information system that enhances the formation of inter-organizational networks and whose objective is to share information of business opportunities between members of a network. It is also a framework of inter-organizational cooperation as a competitive factor and the role of information technology can take in the development of cooperation networks.
This paper attempts to develop a theoretical acceptance model for e-commerce Web site. Key factors impacting e-commerce acceptance are identified from a detailed literature review. The final model is then cast in a structural equation modeling framework comprising ten variables: Web site quality, perceived ease of use, perceived usefulness, perceived playfulness, trust, perceived risk, subjective...
Enterprise architecture (EA) approach has been widely used for managing the complexities and changes in organizations and their business environments. However, research on potential benefits of the approach is rare and lacks strong empirical evidence. In this paper, we adapt the DeLone and McLean model of information systems success for describing the EA benefit realization process. Accordingly, we...
This research proposes an E-Government security trust model and develops a typology of antecedents in the context of citizen tax software use and e-filing. We propose that tax software use and electronic filing (e-filing) offer a novel and interesting research setting that is relevant to E-Government and security because of (1) the use of software to complete tax returns by a large portion of the...
Organizations increasingly depend on the innovation behaviors in order to get the best possible outcome from information systems that have been put into place. However IS research literature shows few studies in understanding the patterns of system usage behaviors that yield innovative or novel ways of using organizational information systems. This paper firstly examines the past information system...
This paper proposed a study on developing a performance measurement model for information and communication technology service quality (ICTSQ). Based on most previous literature within ICT studies, many models have been developed in the concern of service quality (SQ). However, most of these models have not investigated the performance measurement for their service quality (SQ). So far, studies have...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
Digital Earth (DE) is a virtual presentation of the planet based on geographic coordinate, and is an information system with tremendous amount of multiple resolutions and multiple scales data as shown in multiple dimensions. It can visualize the real earth and represent historical phenomena in digital way by using the large amount of data of the earth, and utilizing the computer techniques, image...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.