A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates

<p>This study aimed to investigate (a) the challenges due to lack of IT infrastructure, (b)</p><p>the challenges of security and privacy, (c) the challenges associated with IT skills, (d)</p><p>the knowledge of operating standards...

Full description

Saved in:
Bibliographic Details
Main Author: Alharmoodi, Badir Yousif Ahmed Rafee
Format: thesis
Language:eng
Published: 2023
Subjects:
Online Access:https://ir.upsi.edu.my/detailsg.php?det=10512
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:ir.upsi.edu.my:10512
record_format uketd_dc
institution Universiti Pendidikan Sultan Idris
collection UPSI Digital Repository
language eng
topic HG Finance
spellingShingle HG Finance
Alharmoodi, Badir Yousif Ahmed Rafee
A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates
description <p>This study aimed to investigate (a) the challenges due to lack of IT infrastructure, (b)</p><p>the challenges of security and privacy, (c) the challenges associated with IT skills, (d)</p><p>the knowledge of operating standards and protocols, and (e) the existing operational</p><p>framework. This study employed a systematic review of previous literature by</p><p>focusing on the challenges in and opportunities for a successful transition from egovernment</p><p>to m-government. A survey questionnaire was used to gather the data</p><p>relating to the study constructs from 250 respondents and the proposed framework</p><p>was validated by the Fuzzy Delphi method. The survey data were analyzed using Chisquare</p><p>test that showed the constructs of the study - IT infrastructure, security and</p><p>privacy, IT skills, knowledge of operating standards and protocols, and operational</p><p>frameworks - had significant effects on the transition from e-government to mgovernment</p><p>based on the calculated 2 values not exceeding the threshold value of</p><p>9.488 at the level of significance of .05. Therefore, the Fuzzy Delphi method showed</p><p>there was a strong consensus of opinions among experts regarding the significance of</p><p>the five constructs and their components, as evidenced by the high percentages of</p><p>expert agreement ranging from 93% to 100%. These findings will have several</p><p>implications that the stakeholders need to be aware of the inherent challenges in and</p><p>opportunities for a successful transition of services from e- government to mgovernment,</p><p>which can be better understood with the use of the framework developed</p><p>in this study that highlights the critical parameters involved in such a transition and</p><p>will enable governments to accomplish efficiency in service delivery to citizens and</p><p>corporate entities through wireless information and communication as well as</p><p>integrating various government department and personnel through mobile platforms.</p>
format thesis
qualification_name
qualification_level Doctorate
author Alharmoodi, Badir Yousif Ahmed Rafee
author_facet Alharmoodi, Badir Yousif Ahmed Rafee
author_sort Alharmoodi, Badir Yousif Ahmed Rafee
title A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates
title_short A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates
title_full A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates
title_fullStr A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates
title_full_unstemmed A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates
title_sort framework of challenges of the transition from e-government to m-government in the united arab emirates
granting_institution Universiti Pendidikan Sultan Idris
granting_department Fakulti Pengurusan dan Ekonomi
publishDate 2023
url https://ir.upsi.edu.my/detailsg.php?det=10512
_version_ 1804890564326326272
spelling oai:ir.upsi.edu.my:105122024-06-25 A framework of challenges of the transition from E-Government to M-Government in the United Arab Emirates 2023 Alharmoodi, Badir Yousif Ahmed Rafee HG Finance <p>This study aimed to investigate (a) the challenges due to lack of IT infrastructure, (b)</p><p>the challenges of security and privacy, (c) the challenges associated with IT skills, (d)</p><p>the knowledge of operating standards and protocols, and (e) the existing operational</p><p>framework. This study employed a systematic review of previous literature by</p><p>focusing on the challenges in and opportunities for a successful transition from egovernment</p><p>to m-government. A survey questionnaire was used to gather the data</p><p>relating to the study constructs from 250 respondents and the proposed framework</p><p>was validated by the Fuzzy Delphi method. The survey data were analyzed using Chisquare</p><p>test that showed the constructs of the study - IT infrastructure, security and</p><p>privacy, IT skills, knowledge of operating standards and protocols, and operational</p><p>frameworks - had significant effects on the transition from e-government to mgovernment</p><p>based on the calculated 2 values not exceeding the threshold value of</p><p>9.488 at the level of significance of .05. Therefore, the Fuzzy Delphi method showed</p><p>there was a strong consensus of opinions among experts regarding the significance of</p><p>the five constructs and their components, as evidenced by the high percentages of</p><p>expert agreement ranging from 93% to 100%. These findings will have several</p><p>implications that the stakeholders need to be aware of the inherent challenges in and</p><p>opportunities for a successful transition of services from e- government to mgovernment,</p><p>which can be better understood with the use of the framework developed</p><p>in this study that highlights the critical parameters involved in such a transition and</p><p>will enable governments to accomplish efficiency in service delivery to citizens and</p><p>corporate entities through wireless information and communication as well as</p><p>integrating various government department and personnel through mobile platforms.</p> 2023 thesis https://ir.upsi.edu.my/detailsg.php?det=10512 https://ir.upsi.edu.my/detailsg.php?det=10512 text eng closedAccess Doctoral Universiti Pendidikan Sultan Idris Fakulti Pengurusan dan Ekonomi <p>Abramson, Mark & Means, E. Grady (Editors), (2017), E-government 2015. Rowman and Littlefield Publishers, Inc., New York.</p><p></p><p>Abu-Shanab, E. (2017). Digital government adoption in Jordan: an environmental model. The International Arab Journal of e-Technology (IAJeT), 2(3), 129-135.</p><p></p><p>Ackerman, M. S. (2019). Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing, 8(6), 430-439.</p><p></p><p>Acquisti, A., Brandimarte, L. & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.</p><p></p><p>Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2018). An XPath-based preference language for P3P. In Proceedings of the 12th international conference on World Wide Web (pp. 629-639).</p><p></p><p>Aldosari, B., Al-Mansour, S., Aldosari, H., &Alanazi, A. (2018). Assessment of factors influencing nurses acceptance of electronic medical record in a Saudi Arabia hospital. Informatics in Medicine Unlocked, 10, 82-88.</p><p></p><p>Al-Khouri, A. M. (2017). E-Government strategies the case of the United Arab Emirates (UAE). European Journal of ePractice, 17, 126-150.</p><p></p><p>Almiani, M., Razaque, A., & Al Dmour, A. (2016). Privacy preserving framework to support mobile government services. International Journal of Information Technology and Web Engineering (IJITWE), 11(3), 65-78.</p><p></p><p>Almarashdeh, I., &Alsmadi, M. (2016). Heuristic evaluation of mobile government portal services: An experts' review. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 427-431). IEEE.</p><p></p><p>Aloudat, A., Michael, K., Chen, X., & Al-Debei, M. M. (2018). Social acceptance of location-based mobile government services for emergency management. Telematics and Informatics, 31(1), 153-171.</p><p></p><p>Alruwaie, M., El-Haddadeh, R., & Weerakkody, V. (2017). A framework for evaluating citizens expectations and satisfaction toward continued intention to use e-government services. In International Conference on Electronic Government (pp. 273-286). Springer, Berlin, Heidelberg. Digital Government Society of North America.</p><p></p><p>Al-Shboul, M., Rababah, O., Ghnemat, R., & Al-Saqqa, S. (2014). Challenges and factors affecting the implementation of e-government in Jordan. Journal of Software Engineering and Applications, 7(13), 1111.</p><p></p><p>Alshehri, M., & Drew, S. (2010). E-government fundamentals. In IADIS international conference ICT. Society and human beings.</p><p></p><p>Andam, ZR. (2018). E-Commerce and E-Business. http://www.apdip.net/publications/</p><p></p><p>Anic, I.-D., Budak, J., Rajh, E., Recher, V., Skare, V. & Skrinjaric, B. (2019). Extended model of online privacy concern: what drives consumers decisions? Online Information Review, 43(5), 799-817. https://doi.org/10.1108/OIR-10-2017-0281.</p><p></p><p>Antn, A. I., Bertino, E., Li, N., & Yu, T. (2016). A roadmap for comprehensive online privacy policy management. Communications of the ACM, 50(7), 109-116.</p><p></p><p>Antn, A. I., Earp, J. B., He, Q., Stufflebeam, W., Bolchini, D., & Jensen, C. (2019). Financial privacy policies and the need for standardization. IEEE Security & privacy, 2(2), 36-45.</p><p></p><p>Antovski, L., & Gusev, M. (2018). M-Government Framework. In Proceedings of the First European Conference on Mobile Government (pp. 36-44). Arabian Gulf: a vision toward reality.</p><p></p><p>Atkinson, R.D. & Castro, D.D. (2019). Digital Quality of Life: Understanding the Personal and Social Benefits of the Information Technology Revolution.</p><p></p><p>Anwar, G., & Abd Zebari, B. (2017). The relationship between employee engagement and corporate social responsibility: A case study of car dealership in Erbil, Kurdistan. International Journal of Social Sciences & Educational Studies, 2(2), 45.</p><p></p><p>Arshad, F. (2019). Privacy fox-A JavaScript-based P3P agent for Mozilla Firefox. Privacy Policy, Law, and Technology, 17, 801-810.</p><p></p><p>Badri, M. A., & Alshare, K. (2019). A path analytic model and measurement of the business value of e-government: An international perspective. International Journal of InformationManagement, 28(6), 524-535.</p><p></p><p>Bain (2023) Business Process Reengineering: What Is Business Process Reengineering?</p><p></p><p>Bakunzibake (2019) Improving the Implementation of e-Government services in Rwanda: Organizational perspective</p><p></p><p>Bansal, et al. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138150.</p><p></p><p>Basamh, S., Qudaih, H. & Suhaimi, M. (2014) E-government implementation in the Kingdom of Saudi Arabia: An exploratory study on current practices, obstacles & challenges. International Journal of Humanities and Social Science, 4, 296-300. http://www.ijhssnet.com/journals/Vol_4_No_2_Special_Issue_January_2014/30.pdf</p><p></p><p>Beldad, A., de Jong, M., & Ateehoulder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behaviors, 26(5), 857869.</p><p></p><p>Blythe, S. E. (2016). The Dubai electronic transactions statute: A prototype for E-commerce law in the United Arab Emirates and the GCC countries. Journal of Economic and Administrative Sciences, 23(1), 1-23.</p><p></p><p>Borade, G. (2010). Advantages of information technology. http://www.buzzle.com/ articles/advantages-of-information-technology.html.</p><p></p><p>Burns, N., & Grove, S. K. (2015). Introduction to qualitative research. The practice of nursing research. Conduct, critique and utilization, 67-68.</p><p></p><p>Carroll, J. (2017). 'What's in It for Me?': Taking M-Government to the People. In BLED 2017 Proceedings, 49.</p><p></p><p>Charbaji, A., &Mikdashi, T. (2018). A path analytic study of the attitude toward e-government in Lebanon. Corporate Governance, 3(1), 7682.</p><p></p><p>Chellappa, R., & Sin, R. (2018). Personalization versus privacy: An empirical examination of the online consumers Dilemma. Information Technology and Management, 6, 181202.</p><p></p><p>Chow, W., & Angie, N. (2017). A study of trust in e-shopping before and after first-hand experience is gained. Journal of Computer Information Systems, 9(4), 125130.</p><p></p><p>CIO Council (2017). Government Use of Mobile Technology: Barriers, Opportunities and Gap analysis. Product of the Digital Services Advisory Group and Federal Chief Information Officers Council</p><p></p><p>Coaker, B., & Deans, C. (2017). An Evaluation of US City Government Wireless Networks for Mobile Internet Access. In Mobile Government: An Emerging Direction in e-Government (pp. 357-374). IGI Global.</p><p></p><p>Creswell, J. W. (2017). Research design: qualitative, quantitative, and mixed methods approaches (4th ed). SAGE Publications, Inc.</p><p></p><p>Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., & Reagle, J. (2016). The platform for privacy preferences 1.0 (P3P1.0) specification. MIT/World Wide Web Consortium. http://www.w3.org/TR/P3P/</p><p></p><p>Cranor, L. F. (2018). P3P: Making privacy policies more useful. IEEE Security & Privacy, 1(6), 50-55.</p><p></p><p>Cranor, L. F., Arjula, M., & Guduru, P. (2016). Use of a P3P user agent by early adopters. In Proceedings of the 2016 ACM workshop on Privacy in the Electronic Society (pp. 1-10).</p><p></p><p>Cranor, L. F., Byers, S., & Kormann, D. (2018). An analysis of P3P deployment on commercial, government, and childrens web sites as of May 2018. Washington, DC: Federal Trade Commission.</p><p></p><p>Cranor, L., Dobbs, B., Egelman, S., Hogen, G., Humphrey, J., Langheinrich, M., & Reagle, M. (2017).. The Platform for Privacy Preferences 1.1 (P3P1. 1) Specification. World Wide Web Consortium, NOTE-P3P11-20171113, 13.</p><p></p><p>Darwish, A.M (2019). Egypot:From e-Government to eGovernance. The Road to Fast Pace Development. ICEGOV.</p><p></p><p>Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3). 319340.</p><p></p><p>Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 9821003.</p><p></p><p>Davison, R. M., Wagner, C., & Ma, L. C. (2018). From E-Government Development Index. https://publicadministration.un.org/egovkb/en-us/Data-Center</p><p></p><p>DeLone, W. H., & McLean, E. R. (2019). Measuring e-commerce success: Applying the DeLone & McLean information systems success model. International Journal of electronic commerce, 9(1), 31-47.</p><p></p><p>Dinev, T., & Hart, P. (2017a). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 729.</p><p></p><p>Dinev, T., & Hart, P. (2017b). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 6180.</p><p></p><p>Directors General Responsible for Public Administration. (2018). Resolutions on e-government. http://www.csae.map.es/csi/pdf/ris_dg_egov_fi nal_eng.pdf.</p><p></p><p>Dong, L., Mu, Y., Susilo, W., Wang, P., & Yan, J. (2011). A privacy policy framework for service aggregation with P3P. In The Sixth International Conference on Internet and Web Applications and Services (pp. 171-177).</p><p></p><p>El-Kiki, T., & Lawrence, T. (2016). Emerging mobile government services: Strategies for Success. In 20th Bled eConference, eMergence: Merging and Emerging Technologies (pp. 112). Processes and Institutions.</p><p></p><p>Esteves, J. & Joseph, R. C. (2019) A comprehensive framework for the assessment of eGovernment projects. Government Information Quarterly, 25(1), 118-132.</p><p></p><p>Estevez, E., & Janowski, T. (2013). Electronic Governance for Sustainable DevelopmentConceptual framework and state of research. Government Information Quarterly, 30, S94-S109.</p><p></p><p>European Institute of Public Administration. (2018). Organisational changes, skills and the role of leadership required by eGovernment. http://www.epractice.eu Home Library. </p><p></p><p>Evered, M., & Bgeholz, S. (2019). A case study in access control requirements for a health information system. In Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation-Volume 32 (pp. 53-61).</p><p></p><p>Fang, Z. (2016). E-government in digital era: concept, practice, and development. International journal of the Computer, the Internet and management, 10(2), 1-22.</p><p></p><p>Fasanghari, M., & Samimi, H. (2009). A Novel Framework for M-Government Implementation. In International Conference on Future Computer and Communication (ICFCC) (pp. 627-631). IEEE.</p><p></p><p>Faruq, M., & Hartini, B. (2013). The moderating effect of technology awareness on the relationship between UTAUT constructs and behavioural intention to use technology: A conceptual paper. Australian Journal of Business and Management Research, 3(02), 1423.</p><p></p><p>Fischer (2020). Public Servants as Competent Practitioners of Knowledge Management.</p><p></p><p>McClure, D. L. (2001). Electronic government: challenges must be addressed with effective leadership and management. General Accounting Office.</p><p></p><p>Garofalakis, J. D., Stefani, A., Stefanis, V., & Xenos, M. N. (2007, July). Quality Attributes of Consumer-Based m-Commerce Systems. In ICE-B (pp. 130-136).</p><p></p><p>Germanakos, P., Samaras, G., & Christodoulou, E. (2016). Multi-Channel Delivery of E-Services in the Light of M-Government Challenge. In Mobile Government: An Emerging Direction in E Government (pp.292-317). Hershey, PA: IGI</p><p></p><p>Ginosar, A. and Ariel, Y. (2017). An analytical framework for online privacy research: what is missing? Information & Management, 54(7), 948-957.</p><p></p><p>GovTech. (2009). Survey raises consumer online privacy awareness. Government Technology Magazines, Government Technology.</p><p></p><p>Greene, S., &Kamimura, M. (2018). Ties that bind: Enhanced social awareness development through interactions with diverse peers. In Annual meeting of the association for the study of higher education. Portland: Oregon.</p><p></p><p>Greunz, M., Schopp, B., &Haes, J. (2015, January). Integrating e-government infrastructures through secure XML document containers. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (pp. 10-pp). IEEE.</p><p></p><p>Gunadi, G., & Sandy, G. A. (2009). A formal model for electronic and mobile government service delivery success factors.</p><p></p><p>Hair, J., Anderson, R., Tatham, R., & Black, W. (1998). Multivariate Data Analysis. Prentice Hall, Upper Saddle River, NJ. https://newzoo.com/insights/rankings/top-50-countries-by-smartphone-penetration-and-users/international perspective. International Journal of Information</p><p></p><p>Hassan, M., Jaber, T., & Hamdan, Z. (2019). Adaptive mobile-government framework. In Proceedings of the International Conference on Administrative Development: Towards Excellence in Public Sector Performance,</p><p></p><p>Harvey, N., & Holmes, C.A. (2017) Nominal group technique: An effective method for obtaining group consensus. International Journal of Nursing Practice 18, 188 -194</p><p></p><p>Heeks, R. (2018). Success and Failure Rates of eGovernment in Developing/Transitional Countries: Overview. University of Manchester. http: www.egov4dev.org/sfoverview.htm</p><p></p><p>Hossain, M. S., Samakovitis, G., Bacon, L., & MacKinnon, L. (2015). A conceptual framework for design of mobile governance in developing countries: The case of Bangladesh. In 2015 18th International Conference on Computer and Information Technology (ICCIT) (pp. 161-166). IEEE.</p><p></p><p>Holden, SH. (2021). The evolution of information technology management at the federal level: implications for public administration. In Garson, GD (ed), Information technology and computer applications in public administration: issues and trends. IDEA Group Publishing.</p><p></p><p>Hussain, M. (2017). M-government Implementation: A Comparative Study between a Developed and a Developing Country. Doctoral dissertation, The University of New South Wales, Canberra, Australia.</p><p></p><p>Ibiene (2020) Information and Communication Technology (ICT) Skills and Efficient Management of Educational Resources in Public Secondary Schools</p><p></p><p>ICT Skills Monitoring Group (2016). E-business and ICT skills in Europe. http://www. ec.europa.eu/enterprise/sectors/ict/fi les/synthesis-report-v1_en.pdf.</p><p></p><p>Karlof, C., Sastry, N., & Wagner, D. (2019). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 162-175).</p><p></p><p>Kelly, P., Bresee, J., Cranor, L., & Reeder, R. (2009). A `Nutrition Label` for privacy. In Symposium on usable privacy and security (SOUPS) (pp 4:1-4:12). ACM, Mountain View, CA. </p><p></p><p>Khurat, A., Gollmann, D., &Abendroth, J. (2010). A formal P3P semantics for composite services. In Workshop on Secure Data Management (pp. 113-131). Springer, Berlin, Heidelberg.</p><p></p><p>Kim, Y., Yoon, J., Park, S., & Han, J. (2019). Architecture for implementing the mobile government services in Korea (pp. 601612). Conceptual Modeling for Advanced Application Domains. doi:10.1007/978- 3-540-30466-1_55</p><p></p><p>Kim, M., & Ahn, J. (2017). Comparison of trust sources of an online market-maker in the e-marketplace: Buyers and sellers perspectives. Journal of Computer Information Systems, 47(1), 8494.</p><p></p><p>Kolding, M. & Kroa, V. (2016). E-Skills the key to employment and Inclusion in Europe. http://www.download.microsoft.com/.../f/2/b/.../IDC-White-Paper-ESkills.pdf.</p><p></p><p>Kolter, J., & Pernul, G. (2009). Generating user-understandable privacy preferences. In 2009 International Conference on Availability, Reliability and Security (pp. 299-306). IEEE.</p><p></p><p>Kostopoulos, G. K. (2018). E-government in the Arabian Gulf: a vision toward reality. In Proceedings of the 2018 annual national conference on Digital government research (pp. 1-7). Digital Government Society of North America.</p><p></p><p>Kotze, H. J. N. (1985). Belangrikheid van ter sake inligting wat betydsaanmunisipalebesluitnemersbeskikbaargestelmoet word. Simposium van munisipaleraadsledeenamptenare: vernuwing met samewerking.</p><p></p><p>Kumar, (2019). Locking the door but leaving the computer vulnerable: Factors inhibiting home users adoption of software firewalls. Decision Support Systems, 9(1), 254264.</p><p></p><p>Kushchu, I., & Kuscu, H. (2018). From E-government to M-government: Facing the Inevitable. In the 3rd European Conference on e-Government. MCIL Trinity College Dublin Ireland</p><p></p><p>Kushchu, I., Arat, S., & Borucki, C. (2016). The Impact of M-Government on Organisations: A Mobility Response Model. In Mobile Government: An Emerging Direction in E Government (pp.134-154). Hershey, PA: IGI</p><p></p><p>Lallan, E. (2009, June 24). eGovernment for Development, M-Government Definitions and Models. Management, 28(6), 524-535. http://www.egov4dev.org/mgovdefn.htm</p><p></p><p>Lee, M.-C. (2009b). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130141.</p><p></p><p>Lee, Y.-C. (2018). Will self-regulation work in protecting online privacy? Online Information Review, 27(4), 276-283.</p><p></p><p>Linda & Roy (2022) What is strategic management? Strategic management is the ongoing planning, monitoring, analysis and assessment</p><p></p><p>Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review. Communications of the Association for Information Systems.</p><p></p><p>Liao. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications, 10(6), 702715.</p><p></p><p>Liu, Y. (2012). A unified risk-benefit analysis framework for investigating mobile payment adoption. In 2012 International Conference on Mobile Business.</p><p></p><p>Lowry, P., Cao, J., & Everrard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the sue of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163200.</p><p></p><p>Lwin, M., Wirtz, J. & Williams, J.D. (2016). Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585.</p><p></p><p>Magdy, Y. (2018). The Adoption of Mobile Government Services in Developing Countries: The Case of Egypt. International Journal of Information and Communication Technology Research, 2(4), 333-341</p><p></p><p>McClure, D. (2015), GAO (General Accounting Office). Electronic government: challenges must be addressed with effective leadership and management. http://feapmo.gov/ links.asp</p><p></p><p>MacCarthy, M. (2014). Student privacy: Harm and context. International Review of Information Ethics, 21, 1124.</p><p></p><p>Mari, Smuts, Matthee & Yogesh (2020). An e-Government implementation framework: A Developing Country Case study. doi: 10.1007/978-3-030-45002-1_2</p><p></p><p>Mar, C. (2010). Privacy Bird for chrome. School of Computer Science, Carnegie Mellon University, Pittsburgh, Tech. Rep, 19-608.</p><p></p><p>Martnez-Ballest, A., Prez-Martnez, P. A., & Solanas, A. (2013). The pursuit of citizens' privacy: a privacy-aware smart city is possible. IEEE Communications Magazine, 51(6), 136-141.</p><p></p><p>May, M. J., Gunter, C. A., Lee, I., &Zdancewic, S. (2009). Strong and weak policy relations. In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks (pp. 33-36). IEEE.</p><p></p><p>McDonald, A. M., Reeder, R. W., Kelley, P. G., & Cranor, L. F. (2009). A comparative study of online privacy policies and formats. In International Symposium on Privacy Enhancing Technologies Symposium (pp. 37-55). Springer, Berlin, Heidelberg.</p><p></p><p>Mensah & Zeng (2020). E-Government Services Adoption: An Extension of the Unified Model of Electronic Government. doi.org/10.1177/2158244020933593</p><p></p><p>Miller (2020). Overcoming smallness: Qatar, the United Arab Emirates and strategic realignment in the Gulf</p><p></p><p>Miller, T., Kim, R.H., Fewlner, E.J., Antony, B.K., Bryan, B.K., & James, M.R., (2013). Index of Economic Freedom (pp. 300-305).</p><p></p><p>Monette, S., Trpanier, G., &Bigras, M. (2018). Executive functions in preschoolers: An exploratory study with recent tasks. Poster submitted for presentation at the 2011 convention of the Society for Research in Child Development, Montreal, Quebec</p><p></p><p>Mukherjee, A., & Biswas, A. (2018). Simple implementation framework for m-government services. In International Conference on Mobile Business (ICMB) (pp. 288). IEEE.</p><p></p><p>Mulligan, D.K., Koopman, C. & Doty, N. (2016). Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy. Philosophical Transactions of The Royal Society A Mathematical Physical and Engineering Sciences, 374 (2083), 1-17.</p><p></p><p>Mutimukwe & Ella (2019). Information privacy practices in e-government in an African least developing country. Rwanda</p><p></p><p>Nasser (2017). M-Government adoption factors in the UAE: a partial least squares approach Project. Smart government, M-government (e-government using the emerging technologies) adoption in the UAE</p><p></p><p>Ndou, V. (2019). E-government for developing countries: opportunities and challenges. The Electronic Journal on Information Systems in Developing Countries, 18(1), pp.1-24</p><p></p><p>Neuman, W. L. (2011). Social Research Methods: Qualitative and Quantitative Approaches. USA: Allyn and Bacon.</p><p></p><p>Newzoo's Global Mobile Market Report, (2017). Retrieved from: https://newzoo.com/insights/rankings/top-50-countries-by-smartphone-penetration-and-users/</p><p></p><p>Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.</p><p></p><p>Northrop, A. (2021). The challenge of teaching information technology in public administration graduate programs. In Information technology and computer applications in public administration: Issues and trends (pp. 1-22). IGI Global.</p><p></p><p>Obiria, P. B., & Kimwele, M. W. (2017). A location-based privacy-preserving m-learning model to enhance distance education in Kenya. Journal of Computers in Education, 4(2), 147-169.</p><p></p><p>OBrien (2020). Balancing the contradictions of UAEs data privacy laws businesses in the UAE must respect the law while protecting users.</p><p></p><p>OECD/International Telecommunication Union (2011). M-Government: Mobile Technologies for Responsive Governments and Connected Societies. OECD Publishing. http://dx.doi.org/10.1787/9789264118706-en and ITU Bookshop at www.itu.int/pub/D-STR/m-gov</p><p></p><p>Okazaki, S., Hairong, L., &Morikazu, H. (2009). Consumer privacy concerns and preferences for degree of regulatory control. Journal of Advertising, 38(4), 6377.</p><p></p><p>Office of Management and Budget (2016). E-government strategy. http://www.cio.gov/documents/EgovStrategy.html</p><p></p><p>Organisation for Economic Cooperation and Development (2016). Measuring the information economy. ICT in education and government. http://www.oecd.org/</p><p></p><p>Osah, O., & Kyobe, M. (2017). Predicting user continuance intention towards M-pesa in Kenya. African Journal of Economic and Management Studies.</p><p></p><p>Oui-Suk, U. (2010). Introduction of m-Government & IT Convergence Technology. Working document, KAIST Institute for IT Convergence, Daejeon, Republic of Korea.</p><p></p><p>Pan, Y., & Zinkhan, G. (2017). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331338.</p><p></p><p>Pandey. K. R., & Sekhar, K. S. V. (2013). From e-Governance to m-Governance: The way forward. e-Govt -Technological Framework, 19</p><p></p><p>Pawel (2020). Usability of Mobile Applications: A Systematic Literature Study DOI: 10.1109/ACCESS.2020.2981892</p><p></p><p>Polit, D. F., & Beck, C. T. (2018). Nursing research: Generating and assessing evidence for nursing practice (7th ed.). Philadelphia: Wolters Kluwer Health, Lippincott Williams & Wilkins.</p><p></p><p>Polit, D.F., Beck, C.T. & Hungler, B.P. (2015), Essentials of Nursing Research: Methods, Appraisal and Utilization (5th Ed). Philadelphia: Lippincott Williams & Wilkins.</p><p></p><p>Pollach, I. (2016). What's wrong with online privacy policies? Communications of the ACM, 50(9), 103-108.</p><p></p><p>Qader, N. N., & Kheder, M. Q. (2016). Challenges and Factors affecting the implementation of e-Government in Iraq. Journal of University of Human Development, 2(3).</p><p></p><p>Reagle, J., & Cranor, L. F. (2021). The platform for privacy preferences. Communications of the ACM, 42(2), 48-55.</p><p></p><p>Reidenberg, J. R., & Cranor, L. F. (2016). Can user agents accurately represent privacy policies? Available at SSRN 328860.</p><p></p><p>Rich & Steven (2021). Continue Reading About information technology (IT)</p><p></p><p>Rogers, E. M. (1995). Diffusion of innovations (4th ed.). New York, Free Press.</p><p></p><p>Sharma & J. Gupta (2019). Web services architecture for m-government: issues and challenges. Electronic Government. An International Journal, 1(4), 462-474.</p><p></p><p>Shneiderman, B., & Plaisant, C. (2010). Designing the User Interface: Strategies for Effective Human-Computer Interaction (5th edition). New York: Pearson.</p><p></p><p>Singh, S. (2015). Promoting e-Governance through Right to Information: a case study of India. International Journal of Scientific & Engineering Research, 1(2).</p><p></p><p>Song, G. (2018). Transcending e-Government: a case of mobile government in Beijing. In The First European Conference on Mobile Government. Brighton</p><p></p><p>Srivastava, S. C., & Teo, T. S. (2016). E-government payoffs: Evidence from cross-country data. Journal of Global Information Management (JGIM), 15(4), 20-40.</p><p></p><p>Tair, H. Y. A., & Abu-Shanab, E. A. (2014). Mobile Government Services: Challenges and Opportunities. International Journal of Technology Diffusion (IJTD), 5(1), 17-25.</p><p></p><p>Turoff, M. (2016). The Policy Delphi. In H. Linstone& M. Turoff (Eds.) The Delphi method (pp.8096). http://is.njit.edu/pubs/delphibook</p><p></p><p>UN Millennium Project (2018). Innovation: Applying Knowledge in Development. UN Task Force on Science, Technology, and Innovation, New York.</p><p></p><p>Varian, H.R., Farrell, J. & Shapiro, C. (2018). The Economics of Information Technology. New York: Cambridge University Press.</p><p></p><p>Vaudenay, S. (2017). A classical introduction to cryptography: Applications for communications security. Springer Science & Business Media.</p><p></p><p>Weerakkody, V., Janssen, M &Hjort-Madsen, K. (2016). Integration and Enterprise Architecture Challenges in E-Government: A European Perspective. International Journal of Cases on Electronic Commerce, 3, 13-35.</p><p></p><p>Westin, A. (1967). Privacy and freedom. New York: Antheneum.</p><p></p><p>Whaiduzzaman, M., Hossain, M. R., Shovon, A. R., Roy, S., Laszka, A., Buyya, R., & Barros, A. (2020). A privacy-preserving mobile and fog computing framework to trace and prevent covid-19 community transmission. IEEE Journal of Biomedical and Health Informatics, 24(12), 3564-3575.</p><p></p><p>World Bank (2016). World Development Report 2016: Digital Dividends. World Bank, Digital Adoption Index 2016.</p><p></p><p>Xu, H., Teo, H.-H., Tan, B.C. and Agarwal, R. (2012). Research note effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research, 23(4),1342-1363.</p><p></p><p>Xu, H., Teo, H.-H., Tan, B.C. & Agarwal, R. (2012). Research note effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research, 23(4),1342-1363.</p><p></p><p>Yao, M.Z. & Zhang, J. (2019). Predicting user concerns about online privacy in Hong Kong. Cyber Psychology & Behaviour, 11(6), 779-781.</p><p></p><p>Yao, M.Z., Rice, R.E. & Wallis, K. (2016). Predicting user concerns about online privacy. Journal of the Association for Information Science and Technology, 58(5), 710-722.</p><p></p><p>Yu, T., Li, N., & Antn, A. I. (2019). A formal semantics for P3P. In Proceedings of the 2019 workshop on Secure web service (pp. 1-8).</p><p></p><p>Zafar, A., Hasan, S., & Trigui, M. (2014). Towards secure m-Learning: An analysis. MAGNT Research Report (ISSN. 1444-8939) 2(5), 148159.</p><p></p><p></p><p></p><p></p>