AlHinai et al., 2016 - Google Patents
Rethinking IT-governance: analytical review of IT governance for social media based on the COBIT standardAlHinai et al., 2016
View PDF- Document ID
- 17086673071753505770
- Author
- AlHinai Y
- Al-Badi A
- Al-Harthi I
- Al-Aufi A
- Al-Salti Z
- Publication year
- Publication venue
- International Journal of Services, Economics and Management
External Links
Snippet
Information and Communication Technology (ICT) is considered to be one of the most critical innovations that enable governments to improve service delivery, encourage effective citizen participation, and achieve organisational goals. A type of ICT which is growing which …
- 238000005516 engineering process 0 abstract description 48
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Custers et al. | EU personal data protection in policy and practice | |
Piotrowski | The “Open Government Reform” movement: The case of the open government partnership and US transparency policies | |
Bennett et al. | Critical perspectives on the security and protection of human rights defenders | |
Greene | Security program and policies: Principles and practices | |
Allen et al. | The role of data custodians in establishing and maintaining social licence for health research | |
Shapovalova | The power of informality: European Union’s engagement with non-state actors in common security and defence policy | |
Medzini et al. | Self-governance via intermediaries: Credibility in three different modes of governance | |
Beckley | Is managerialism alive and well in the police service? | |
Parycek et al. | Identification in e-participation: between quality of identification data and participation threshold | |
Lefebvre | Academic-intelligence relationships: opportunities, strengths, weaknesses and threats | |
AlHinai et al. | Rethinking IT-governance: analytical review of IT governance for social media based on the COBIT standard | |
Choejey | Cybersecurity challenges and practices: a case study of Bhutan | |
Tang | Privacy in practice: Establish and operationalize a holistic data privacy program | |
Robb | Models and methods of cost‐effective child custody evaluation | |
Francoli et al. | From informing to empowering: Best practices and recommendations for improving government-civil society interactions within OGP | |
Mui et al. | In-Person and Remote Employees and Information Security Policy Compliance | |
Randolph | Identifying the Role of Healthcare Leaders in Protecting Sensitive Information Within Their Sector | |
Aceron | An Evaluative Study on the Citizen’s perception towards the Philippine Identification System through the lens of Technology Acceptance Model | |
Gillies | Collecting and Protecting Student Data: How School Policy Enables Victorian Catholic School Teachers' Use of Web-Based Applications | |
Mothlasedi | Intergrating Records Management into Open Government Initiatives in Botswana | |
Dubois | Cyber Insurance As An Effective Cyber Risk Management Strategy For Local Government Resiliency: The Case Of Municipalities In New York State | |
Zeimetz | Qualitative Case Study of the Mission, Money, and Merit Model in a Nonprofit Membership Association | |
Crotts | The College Gets Its Act Together: Cutting the Costs of Disputes in Organizations | |
Thomopoulos et al. | Developing an Anti-Phishing Large Language Model: A Focus Group Study on Human, Technological, and Legal Factors | |
Deya | FACULTY OF SOCIAL SCIENCES DEPARTMENT OF MEDIA AND SOCIETY STUDIES |