Examining red tape in public and private organizations: a further look at the role of individual perceptions and attributes

2002 ◽  
Vol 39 (3) ◽  
pp. 477-482 ◽  
Author(s):  
Patrick G Scott
1992 ◽  
Vol 24 (3) ◽  
pp. 290-322 ◽  
Author(s):  
Barry Bozeman ◽  
Pamela N. Reed ◽  
Patrick Scott

Author(s):  
Pilar González-Navarro ◽  
Rosario Zurriaga-Llorens ◽  
Adekunle Tosin Olateju ◽  
Lucía Llinares-Insa

1992 ◽  
Vol 3 (1) ◽  
pp. 63-72 ◽  
Author(s):  
Trevor D. Heaver

Shippers are seeking international gateways that can provide them with services consistent with “seamless logistics”. This places pressures on public and private organizations, such as customs and freight forwarders, to adopt competitive technologies and systems. Electronic data interchange and integrated logistics management practices enable significant improvements in border procedures. A comparison of developments in four countries reveals that strategic changes by customs will enable more efficient logistics services. However, customs and forwarders in the countries are progressing at different rates.


2018 ◽  
Vol 50 (9) ◽  
pp. 1213-1237 ◽  
Author(s):  
James W. Cortada

This essay discusses the interrelationship among administrative practices, use of information and computing technologies (ICTs) in public and private organizations, and the role of information. This provides a historical overview of trends in all three areas, arguing that they were entwined, largely in the post–World War II era. The essay suggests how information exists in organizations, posing historical research questions undertaken by historians and makes recommendations on themes and methods for future studies. It argues that the use of information is the fundamental subject most in need of research as it was the basis for administrative activities and for the use of ICTs.


2009 ◽  
pp. 2198-2213
Author(s):  
Claudio Agostino Ardagna ◽  
Ernesto Damiani ◽  
Fulvio Frati ◽  
Salvatore Reale

The widespread diffusion of online services provided by public and private organizations, firstly driven by e-commerce and more recently by egovernment applications, has stressed the need of secure ways to authenticate users who need to access online resources. The huge number of resources accessible on the Web leads to different authentication mechanisms implementations that often require multiple log-on actions also in intradomain multiservices scenario. In case of high sensitive services, users’ authentication plays a role of paramount importance. In this article is presented a case study that gives a roadmap of authentication mechanisms implemented at different levels of services’ software structure. The discussion starts by illustrating different authentication solutions implemented at operating system, application server or components level to conclude with Single Sign-On approach. For each solution, pros and cons are discussed. The SSO system, called CAS++, developed as an extension to Yale University’s CAS, is then presented.


Author(s):  
Andreas Mitrakas

The growing use of information technology in sensitive daily transactions highlights the significance of information security to protect information assets. Vulnerabilities associated with public and private transactions pose challenges that government, private organizations, and individuals are compelled to respond to by adopting appropriate protection measures. Information security responds to the need of transacting parties for confidentiality, integrity, and availability of resources (Pfleeger, 2000). Information security is required in transactions carried out among, businesses, public administrations, and citizens. An organizational response to information security threats includes setting up and implementing appropriate policy frameworks that are typically endorsed by agreement. Beyond organizational objectives lies an emerging legal framework instigated by the role of information security as a means to safeguard information assets that are socially significant. Organizations are often required to implement information security measures mandated by industry regulations or legislation, such as in electronic banking transactions. The scope of these legal and regulatory requirements is to mitigate potential risk that entails liabilities for shareholders, employees, customers, trading partners, or other third parties involved in a transaction. Information security and its subsequent regulation are equally important for public services. In e-government services made available to citizens and businesses, information security ensures e-government transactions. The remainder of this article presents an overview of the prevailing legal and policy issues that are currently associated with information security.


2008 ◽  
pp. 2422-2431
Author(s):  
Andreas Mitrakas

The growing use of information technology in sensitive daily transactions highlights the significance of information security to protect information assets. Vulnerabilities associated with public and private transactions pose challenges that government, private organizations, and individuals are compelled to respond to by adopting appropriate protection measures. Information security responds to the need of transacting parties for confidentiality, integrity, and availability of resources (Pfleeger, 2000). Information security is required in transactions carried out among, businesses, public administrations, and citizens. An organizational response to information security threats includes setting up and implementing appropriate policy frameworks that are typically endorsed by agreement. Beyond organizational objectives lies an emerging legal framework instigated by the role of information security as a means to safeguard information assets that are socially significant. Organizations are often required to implement information security measures mandated by industry regulations or legislation, such as in electronic banking transactions. The scope of these legal and regulatory requirements is to mitigate potential risk that entails liabilities for shareholders, employees, customers, trading partners, or other third parties involved in a transaction. Information security and its subsequent regulation are equally important for public services. In e-government services made available to citizens and businesses, information security ensures e-government transactions. The remainder of this article presents an overview of the prevailing legal and policy issues that are currently associated with information security.


Sign in / Sign up

Export Citation Format

Share Document