Value Assessment in E-Government and M-Government

Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.

2015 ◽  
pp. 735-752
Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.


In the workspace, when we are working at home it is vital for property holders to keep up vital records and information. In this manner, the security of the workspace entryway is extremely important to build security and it can avoid burglary when the workspace isn't utilized or relinquished. The easiest security for the entryway is introducing a manual key. Yet, manual key is anything but difficult to break. With advancement of entryway security innovation it utilizes watchword, finger check, and numerous others, yet security is just to open and shutting entryway. Yet, when the entryway was persuasively opened or harmed by hoodlums, the property holder still had no data that the entryway was broken. To conquer this issue, a framework that can supplant the manual entryway bolt to a more advanced entryway security framework is required with the goal that it is difficult to separate and can see whether the entryway is opened or harmed by a cheat. To run this framework, 3 parts are utilized, to be specific RFID card as a key re-arrangement apparatus, a sensor to gauge vibration on the entryway when it is constrained open or harmed by criminals and tells the mortgage holder by means of SMS


2019 ◽  
Vol 4 (1) ◽  
pp. 70-77
Author(s):  
Kustori Kustori

Politeknik Penerbangan Surabaya memiliki Laboratorium Airfield Lighting System yang sudah menggunakan Fingerprint dalam pengoperasiannya, tetapi karena kurangnya pengawasan terhadap suatu alat yang akan dipinjam mengakibatkan hilangnya barang atau peralatan yang ada pada laboratorium. Permasalahan yang dikaji dalam penelitian ini adalah belum adanya pengawasan terhadap peminjaman alat yang ada pada laboratorium Airfield Lighting System serta kurangnya sisi keamanan pada laboratorium. Penulisan penelitian ini bertujuan untuk merancang suatu sistem proteksi otomatis pada laboratorium Airfield Lighting System Politeknik Penerbangan Surabaya dengan menggunakan Motion Detector sebagai pendeteksi gerakan manusia, Radio Frequency Identification (RFID) sebagai pendeteksi peralatan dan CCTV sebagai Monitor keadaan yang ada pada laboratorium. Pengontrolan dilakukan secara wireless yaitu dengan menggunakan media Short Message Service (SMS). Hasil dari rancangan ini adalah terciptanya suatu alat bantu untuk memonitor peminjaman alat yang ada pada laboratorium dan menambah sistem keamanan untuk mencegah terjadinya pencurian pada laboratorium Airfield Lighting System


2021 ◽  
Vol 4 (2) ◽  
pp. 127-133
Author(s):  
Anggi Martua Valentino Sianipar ◽  
Solikhun Solikhun ◽  
Widodo Saputra ◽  
Iin Parlina ◽  
Zulaini Masruro Nasution

In the era of the industrial revolution 4.0 today, many technologies are used by humans to help their daily activities, one of which is in the field of home door security. To improve the security of home doors, we can use the Arduino Mega2560 as a control center, we can design a prototype for a door security system using E-KTP which is equipped with several sensors to improve the security of the door that is used as access for entry and exit. E-KTP is a card that is used as a person's identification and can also be used as a tool to open the door in the design of this tool, because in it there is a chip that can be read using electromagnetic waves. RFID (Radio Frequency Identification) is a sensor that can be used to read E-KTP, and to control it remotely, we can use the SMS (Short Message Service) service that is on every Cellphone / Smartphone so that the security of the house door is better because it is also equipped with Magnetic sensors and Buzzer as security if the door is forced to open by an irresponsible person.


Nowadays security is the most common problem in door locking system. Anyone can break the door using hard objects and make a robbery of the home, offices and any other properties. This can lead to huge loss for the human economy. In this paper we are proposing a model, in which we used to lock and open the entryway utilizing the google help over the voice and stun IoT board and stun IoT application. The existing system rely on microcontroller, Global System for Mobile (GSM) , GPS(Global Positioning System), various sensors, programming like MATLAB, biometric face affirmation, Iris scanner, RFID(Radio frequency identification ) technology [6], smart card and mystery express etc. In a colossal fragment of frameworks, Short Message Service (SMS) approach is utilized for correspondence so the structure, it requires some test to pass on message.


2011 ◽  
Vol 52-54 ◽  
pp. 2151-2156
Author(s):  
Yuan Li Yang

By analysis on the realization for RFID (Radio Frequency Identification) technology, TC35i module of CTI (Computer Telecommunication Integration) technology, this article provided a solution and technology realization method for Logistic Information Perception Interactive System. The Logistic Information Perception Interactive System is a combinational application of Internet Of Things (IOT)) RFID, CTI and internet technology, the system consists of three levels system structure of perception level, network level and interaction level, which is supported by RFID reader, RFID logistic tag, TC35i module and other software and hardware as well as interface technologies, integrates and build logistic business flow and information perception interactive section link for supply chain, forms interactive system of RFID logistic, TC35i equipments, user mobile communication, internet communication and other sections. In the Logistic Information Perception Interactive System, it uses AT signal, API (Application Programming Interface) interface program to design short message logistic business interactive program based on TC35i and RFID, realizes isomerism application of communication, technology in terms of logistic information application means, realizes the ubiquitous links and distribution management of perception logistic.


2012 ◽  
pp. 484-497
Author(s):  
Lai Pek Hia ◽  
Lee Shu Wen

Governments around the world have implemented or are in the midst of implementing, amid differing levels of progress, electronic government (e-Government). These implementations create different values for the different stakeholders. This chapter examines an e-Government Component Assessment Cube Framework for value assessment of e-Government information technology project implementations. The three main groups are (value) components, stages, and stakeholders.


Author(s):  
Roba Abbas ◽  
Katina Michael ◽  
M. G. Michael ◽  
Anas Aloudat

This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This case investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring will have on society. The five stakeholder types explored in this case include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies like mobile camera phones, global positioning system data loggers, spatial street databases, radio-frequency identification, and other pervasive computing can be used to gather real-time, detailed evidence for or against a given position in a given context. Limited laws and ethical guidelines exist for members of the community to follow when it comes to what is permitted when using unobtrusive technologies to capture multimedia and other data (e.g., longitude and latitude waypoints) that can be electronically chronicled. In this case, the evident risks associated with such practices are presented and explored.


Author(s):  
Roba Abbas ◽  
Katina Michael ◽  
M. G. Michael ◽  
Anas Aloudat

This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This case investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring will have on society. The five stakeholder types explored in this case include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies like mobile camera phones, global positioning system data loggers, spatial street databases, radio-frequency identification, and other pervasive computing can be used to gather real-time, detailed evidence for or against a given position in a given context. Limited laws and ethical guidelines exist for members of the community to follow when it comes to what is permitted when using unobtrusive technologies to capture multimedia and other data (e.g., longitude and latitude waypoints) that can be electronically chronicled. In this case, the evident risks associated with such practices are presented and explored.


Author(s):  
Rahman Atiqur

<span>The ideas of shrewd urban communities have consistently been a fantasy. There have been headways produced using the recent years to make a shrewd city dream to reality with the advancement of innovation, smart gadgets are getting increasingly normal in regular daily existence. In this paper a radio frequency identification (RFID) based smart parking system using Internet of Things (IoT) innovation is actualized. The ultrasonic sensors are set before the parking spots and speaker is utilized for sign. On the off chance that the parking space is vacant, at that point light emitting diode (LED) will squint and the parking opening is full LED will be OFF. At the point when vehicle is left the RFID will peruse the data and cut the particular sum and by utilizing IoT location will be sent through short message service (SMS) to proprietor using global system for mobile communications (GSM) and global positioning system (GPS) advancements.</span>


Sign in / Sign up

Export Citation Format

Share Document