A Caring Heart Program Enhancement in Ondo State through Augmented E-Government Implementation Code:[S43NH33]
Adegboye Adegboyega,
Mamidu Aruna Ishola,
Adu Babafemi Ojo
Issue:
Volume 2, Issue 4, August 2014
Pages:
17-25
Received:
4 October 2014
Accepted:
16 October 2014
Published:
30 October 2014
Abstract: This study appraised e-Government implementation in Ondo state government ministries, agencies and departments. It determined the availability of e-Government resources and infrastructure, the stage of e-government implementation and the challenges. Siau and Long, 2005 five phase of e-Government model was used for analysis. Survey design approach was adopted. Data were collected with a structured questionnaire administered to the Director of IT and administrators in the ministries, agencies and departments, result shows 96.42% participation. Collected data were structured into grouped frequency distributions. Findings revealed that Ondo state had made an entrance into e-Government. Resources and infrastructure for e-Governance were available and the State was found to be at the second phase (interaction) of e-Government process and has not effectively demonstrated its capacity to progress towards the higher phases of e-government. The study indentified factors that inhibit the implementation of e-Government in Ondo state and recommended how e-government implementation can be further improved in order to accomplished various present and future government programs and delivered the present and future expectation of citizen, Ondo state vision 20: 2020 and make it a truly Sunshine state. This research work is done using Ondo state as study case; it can be apply to any state in developing countries.
Abstract: This study appraised e-Government implementation in Ondo state government ministries, agencies and departments. It determined the availability of e-Government resources and infrastructure, the stage of e-government implementation and the challenges. Siau and Long, 2005 five phase of e-Government model was used for analysis. Survey design approach w...
Show More
Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices
Valerie Garises,
Jameson Mbale
Issue:
Volume 2, Issue 4, August 2014
Pages:
26-31
Received:
5 September 2014
Accepted:
26 September 2014
Published:
30 October 2014
Abstract: In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and authorization, boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security. In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).
Abstract: In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, ...
Show More