Strategic alignment of IT resources – A case study in Grocery industry (Part 1)
Strategic Alignment of IT Resources Grocery Industry Kathleen Chan, Deepesh Joseph, Raymond Jones, Paul Walleck Introduction To investigate how and why grocery companies are aligning...
Definition of E-Governance
The e-Government Act defines “electronic Government’ as “the use by the Government of web-based Internet applications and other information technologies, combined with processes that implement...
Reason for Federal Agencies to be Pro-Active
OMB is now in action mode without clear instructions and expectations. IT project failures and its increased concern has taken OMB to a point where...
EHRI and its Effect on Federal Agency Performance
My vision is that agencies will become more proactive in establishing strong project management techniques and creating more live and actionable cost estimation and analysis...
Re-baselining of IT projects – Factors that makes it difficult and some recommendations
Before addressing the question, it would be beneficial if we understand what baselining and re-baselining is. Baselining is the common project management method where we...
Where are federal IT initiatives heading – Success or Failure – Lessons learned
GAO Cost Estimating and Assessment Guide is very extensive and gives us clear details of federal IT initiatives. The guide, together with OMB circular and...
Ideals of Openness, transparency Vs confidentaility, secrecy
There is great effect of privacy / individual rights on true e-Government implementations. As always, the core goals of e-Governance initiatives are to bring about...
Effect of Customer Satisfaction on Funding of E-Government Initiatives
From experience of Congress itself, it should be maintained that funding of e-government projects are driven by customer satisfaction. Is this correct? I believe this...
Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?
Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is...
E-Government Transformation in Maharashtra, India
The scalar transformation of e-government implementation models in the state of Maharashtra, India, took place exactly as West pictures as billboard, partial service delivery and...
True Transformation – Is it ever possible in E-Government setup?
This is an interesting and very scholastic topic to share and discuss. The basic question being raised is – Are e-government initiatives capable to bring...
Would Blogging in a Government Office be Appropriate? Why or why not?
Blogging has its relevance in supporting electronic government only if it is accepted within that localized setup and is strictly monitored and controlled by the...
Establishing the capability for employees of a local or national government to blog about their work life and access their Facebook accounts during work hours constitute Electronic government?
This clearly does not constitute electronic government in US and most of the world’s government context. The focus of electronic government is to use technology...
Will Rohr’s Secular Writings About Government Change In The Present?
If Rohr would have written his book in the present year, it would have a clear shift from the focus on defining what a perfect...
Effect of State of Technology Available on Open Government Authors
This reading materials as listed in the Bibliography, sets the stage for deeply analyzing the origins of the most long lasting government setup of the...
Federal IT Dashboard
Federal IT Dashboard...
Should the United States increase the number of H-1B visas and green cards so international skilled workers can become permanent residents?
The basic point underlying the issues is that U.S. has an immense shortage of highly skilled labor ever year and the current percentage of fresh...
What measures need to be taken to make sure that offshore outsourcing does not adversely affect American jobs?
Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing – 1....
Where should cyberlaw enforcement be centered?
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this...
How Pervasive is Phishing?
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing...
Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?
Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and...
USA Patriot Act and Data mining
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other...
What limitations should be imposed on datamining of email traffic patterns?
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy and result oriented when...
Should wiretapping of US citizen internet usage require a warrant?
First of all, I don’t think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11,...
Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Using Technology to combat terrorrism?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?
Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out...
Can filtering protect children from harmful material in chatrooms, blogs, and social networks?
I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be...
Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to...
Should spyware be allowed for digital rights management, as exemplified by Sony and Microsoft practices?
Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware is...
Should parents, employers, and government be allowed to use spyware to monitor for bad behavior?
Interesting topic isn’t it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is used for...
What non-regulatory practices can users follow to reduce the incidence of spyware on their computers?
Some tips will be – 1. Make a point that one would not visit web sites such as mass advertising web sites as they are...
A revolutionary supposition – Advice for improved Education system
The educational system should revise the curriculum according to the current technology demands in the society and to build creativity of students. I think the...
Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?
Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” –...
What can be learned from educational experiences where all students in certain school districts have been given computers?
The lesson learned should be lack of effective direction and control in implementing the plan. I remember from IST 601 that we should control technology,...
What implementation plans should countries make before entering into contracts to purchase low-cost computers?
Here is a nice article on what determines the usage of XO type laptops in developing countries – http://www.olpcnews.com/countries/india/ . The article can be used...
Is it likely that placing laptops in the hands of students will help developing countries overcome the digital divide?
I think OLPC program is making a sincere effort with a clear vision from Negroponte. The idea is that it is not the only means...
Should funding be available for social impacts research when it is not likely to lead to new innovations?
I think we should encourage funding on social impact research as it would lead us to explore and find answers to long disputed or rather...
Is there a need for languages (like Java/ActiveX) where a corporation controls the standard but can only modify it in public ?
Java (SunMicroSystems) and ActiveX (Microsoft) are two major technology platforms that has evolved itself a long way from years of R & D and support...
What protections should the public have regarding access to broadband networks for reception and/or transmission?
700 Mhz band is being developed and utilized with the intention of allowing entrepreneurs with less capital to establish broadband services, since it offers cheap...
Should carriers have the freedom through contracts and licenses to shape how their networks will be used?
Again this is an instance of protecting consumer rights and freedom in utilizing the digital medium. The carriers have a very important role in maintaining...
Should distributors be allowed to charge differently for different types of traffic?
This reminds me of the most common issue – when should government leave the publishing of information to the private?. Intended quality and convenience of...
Should broadband distributors be regulated as common carriers by the FCC?
From the literature and court cases, FCC is less obliged to regulate broadband distributors as common carriers, as “Computer network Information” services are not subject...
Modifying World Trade Organization’s TRIPS agreement?
Here is another analysis article on a widely asked question – “Should treaties like the World Trade Organization’s TRIPS agreement be modified so developing countries...
Should the US patent process be revised as suggested in S 1145 and HR 1908?
Here is an interesting analysis article (short and sweet as we say) on “Should the US patent process be revised as suggested in S 1145 and HR...
Should the Linux and Open Source communities be protected from software patent challenges?
Here is an short and to-the-point article on a most debated topic that I would want everyone to focus on now – “Should the Linux...
Impact of Software Patents on Innovation in the Software Industry
This article is a good resource for those who want to know more about the most raised question – What is the impact of software patents...
Need for Legal and Technological Protection Mechanisms
This article is a good resource for those who want to know more about the most raised question – Is there a need for legal and...
Is there a need to legitimate digital rights management mechanisms for protecting intellectual property?
This article is a good resource for those who want to know more about the most raised question – Is there a need to legitimate digital...
How can the intellectual property community protect their intellectual property without the DMCA safeguards?
This article is a good resource for those who want to know more about the most raised question – How can the intellectual property community...
Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified?
This article is a good resource for those who want to know more about the most raised question – Should the prohibition in the Digital...
Can data quality regulations be used to keep agencies unbiased in their postings?
This is an interesting article that I would recommend which tries to find some conclusion as how agencies may be controlled on posting biased or...
Does making documents accessible over the web eliminate the need for printing documents?
The core idea of this article is to comtemplate on a most commonly discussed topic – Does making documents accessible over the web eliminate the...
Making Government documents transparent
There are so many articles about e-governance, but all these articles stress on what e-governance can do, with little thought on how and when e-governance...
Implementing E-Government Act
Article...
CIO’s need to know organizational assumptions about IT
Though Information Technology (IT) is seen as a core enabler of business continuity and competence, it is not always viewed so. I was impressed by...
Shaping global business strategy based on cultural determinants
This article is based on a research paper that I reviewed recently as included in the reference section. The focus of this article is to...
Overcoming Competing Commitment
“Competing commitment and how to overcome it” – A review of work done by Kegan R. and Lahey L. L. Overcoming employee resistance has been...
Theory of Business (TOB), Business strategy and more – A case study
Bertelsmann AG is the largest media and entertainment group in Europe and the second largest in the world to U.S. based Time Warner, Inc. Bertelsmann...
Applying NPV, ROI – An example to guide IT strategist to evaluate IT investments
Case Study: Opportunity A: Your bank is looking at an optical character recognition (OCR) system to further automate the check processing function. Check processing is...