Factors Affecting M-Government Deployment and Adoption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: E-government, m-government, system dependability, system security, trust.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1111532

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1712

References:


[1] Internet world stats, “ History and Growth of the Internet from 1995 till Today”, 2014, (Online): available at: http://www.internetworldstats.com/emarketing.htm
[2] Internet live stats, “Number of Internet Users 2014” 2014, (Online): available at: http://www.internetlivestats.com/internet-users/
[3] Ericsson, “Ericsson Mobility Report 2014, November”, 2014, (online): available at: http://www.ericsson.com/res/docs/2014/ericsson- mobility-report-november-2014.pdf)
[4] A. Al-Hadidi, “An Exploratory Study on Adoption and Diffusion of m-Government Services in the Sultanate of Oman”, 2013, School of Engineering Cardiff University, Cardiff, UK.
[5] I. Kushchu, “Mobile government: an emerging direction in e-government”, 2007, Canada, IGI Publishing
[6] I. Kushchu, “From e-government to m-government: facing the inevitable”. 2003, Proceeding of 3rd European conference on e-government, pp. 252-261
[7] T. Zefferer, “Mobile government e-government for mobile societies”. 2011, Secure Information Technology Center – Austria
[8] Vodafone Americas Foundation, CelloPhone Wireless Innovation Project”, 2011, (online): available at: http://project.vodafone-us.com/winners-2009-cellophone.html
[9] Simpill, 2011, (online): available at: http://www.simpill.com/, (accessed on 13.01.2015)
[10] Ushahidi, 2011, (online): available at: http://www.ushahidi.com/, (accessed on 13.01.2015)
[11] Bridgeit, “Mobile Technology Program”, 2011, Pearson Foundation. (online): available at: http://www.pearsonfoundation.org/education-leadership/programs/bridgeit.html
[12] Télécoms sans frontiers, http://www.tsfi.org/, (accessed on 17.01.2015)
[13] BuitenBeter, 2011. (Online): available at: http://www.buitenbeter.nl/english
[14] S. Chatzinotas, M. Ntaliani, S. Karetsos, and C. Costopoulou, “Securing m-Government Services: The Case of AgroportaL”, 2011, (Online) available at: http://www.mgovernment.org/resurces/euromgvo2006/ PDF/8_Chatzinotas.pdf
[15] TextaParent, “School to Parent messaging, lowest cost school text messaging, 4c per text message”, 2011, (Online): available at: SMS, https://www.textaparent.ie/, (accessed on 17.01.2015)
[16] Aber, “Aberystwyth University – Bus Text Message Service”, 2011, (online): available at: http://www.aber.ac.uk/en/mapstravel/bus/text-message/
[17] Handyparken. 2011, (Online): available at: http://www.handyparken.at/ handyparken/home.seam, (accessed on 20.01.2015)
[18] IFG, “The Potsdam eGovernment Competence Center: Mobile Government Swedish Style”, 2011, (online): available at: http://www.ifg.cc/index.php?option=com_content&task=view&id=6184&Itemid=92
[19] Textalert, “Alert DC”, 2011, (online): available at: https://textalert.ema.dc.gov/index.php?CCheck=1
[20] S. Trimi, and H. Sheng, “Emerging Trends in M-Government”, 2008, Communications of the ACM, vol. 51, no. 5.
[21] O. Al-Hujran, “Toward the utilization of m-government services in developing countries: a qualitative investigation”, 2012, International Journal of Business and Social Science, vol.3, no. 5, pp. 155-159.
[22] A. Al-Hadidi, “An Exploratory Study on Adoption and Diffusion of m-Government Services in the Sultanate of Oman”, 2013, School of Engineering Cardiff University, Cardiff, UK.
[23] A. Al Thunibat, N. Zin, and N. Sahai, “Identifying User Requirements of Mobile Government Services in Malaysia Using Focus Group Method”, 2011, Journal of e-Government Studies and Best Practices, pp. 2-14.
[24] M. Kumar, O. Sinha, “M-Government – Mobile Technology for e-Government”, 2007, pp. 294-301.
[25] T. Alhussain, “Factors influencing the adoption of biometric authentication in mobile government security”, 2011, pp.19-25.
[26] M. Al-Mutairi, “M-Government: Challenges and Key Success Factors– Saudi Arabia Case Study”, 2012, pp. 78-93.
[27] Nypost, 2014, ObamaCare website glitches freeze out public on deadline day. (online): available at: http://nypost.com/2014/03/31/ obamacare-website-goes-down-on-morning-of-deadline/
[28] Obame Care Facts, 2014, (online): available at: http://obamacarefacts.com/obamacare-website/
[29] Millions log on for Obama care, 2014, (online): available at: http://www.msnbc.com/msnbc/millions-log-obamacare-crashing-sites
[30] O. Campion-Awwad, A. Hayton, L. Smith and M. Vuaran, “The National Programme for IT in the NHS”, 2014.
[31] Cnet, 2014, Samsung Galaxy 5 Finger Print Scanner, (online): available at: www.cnet.com/.../samsung-galaxy-s5s-fingerprint-scanner-in-action-pictures/
[32] Businessinsider, “Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data”, 2014, (online): available at: http://www.businessinsider.com/amazon-lost-data-2011-4
[33] Macdailynews, Microsoft’s Windows Azure Compute cloud suffers global crash, 2013, (online): available at: http://macdailynews.com/ 2013/11/01/microsofts-windows-azure-compute-cloud-suffers-global-crash/
[34] Forbes, “Amazon's EC2 Crashes, Start-ups Go Down Too”, 2011, (online): available at: http://www.forbes.com/sites/tomiogeron/2011/ 04/21/amazons-ec2-crashes-start-ups/
[35] Techcrunch, “Ireland Weighs In On Microsoft v. US Government” 2014, (online): available at: http://techcrunch.com/2014/12/23/ireland-weighs-in-on-microsoft-v-us-government/
[36] The guardian, “US court forces Microsoft to hand over personal data from Irish server” 2014, (online): available at: http://www.theguardian.com/technology/2014/apr/29/us-court-microsoft-personal-data-emails-irish-server.