The research also looks to quantify and prioritize the various types of applications respondents would like to have on an e-government website, and measures their relative levels of trust in transacting with each application, depending on what level of personal information is needed.
How is means-ends analysis (see ii) in question 2 above)) used to narrow down the scope of measurement?
The researcher has specifically created a five-point Likert scale to measure the attitudes to means objectives to measure them through factor analysis statistical techniques vs. their ends, or fundamental objectives. Using means-based objectives to guide to overall structure of the questionnaire assumes the decision frame has been defined, and in the context of this study, that frame is the use of electronic government applications.
Discuss briefly, the research design (population & sample, instrument, proposed data collection and analysis etc.) succinctly.
Administered to a respondent base of existing e-government application users via a web-based survey using attitudinal Likert scaling question structure to a total population of 1,000 users with 300 being the target response level best summarizes the methodology succinctly.
4. If you can, make a single suggestion to improve the study. In making your suggestion, work within the existing the document (i.e., accept the research goals, the use of multiattribute method and means-ends analysis, use of a survey method etc.)
What is most troubling about the methodology is that there are no...
A study of e-government initiatives in Canada by Ayert, for example, found that, "Each department valued its own information system, its own database, and its own information culture. Malevolence was not involved; rather, the systemic goal was perceived through the departmental filter" (770). Moreover, despite mandates from the government's top authorities to develop seamless e-governmental systems and approaches to deliver services in an online setting, governmental departments engaged in
victims of an organization's data breach? The largest data brokers, government agencies, retailers, Internet businesses, financial institutions and educational institutions of the nation have disclosed a number of computer intrusions and data breaches. A data breach can take place in case of theft or loss of, or some kind of illegal access to the data that contains sensitive information which is personal and can compromise the integrity or confidentiality of
Like what was stated previously one of the biggest issues facing China was large amounts of corruption taking place. This caused many local governments to experience runaway deficits and inefficiency. Under new public sector management, the government would address this issue by: using a combination of privatization / government-based models that were discussed earlier, it reduced the size of government, improved the rule of law and they would allow
Rick Santorum's official campaign put out the next ad, entitled Obama Ville. It was released on March 23, 2012. It creates the image of empty American towns in 2 years, and uses very dark imagery and almost horror-genre like angst. The images of the residents of these towns are cast in dark shadows, and with depressing old infrastructure. This advertisement is painting the picture that in the next 2 years
IT Ethics -- Annotated Bibliography Bowie, Norman E. (2005). Digital Rights and Wrongs: Intellectual Property in the Information Age. Business and Society Review, 110(1), 77-96. Norman Bowie takes great pains in his peer-reviewed article to point out what is legal an what is not legal when it comes to recording / taping from television and from the Internet. In fact Bowie uses an illegal issue (downloading music from the Internet) to present a moral
Knowledge of the program's existence within a state can also hopefully act as a deterrent for an addicted 'doctor-shopper.' Article Relevance: Doctors are growing increasingly cautious about prescribing pain medication. This is unfortunate, given the fact that not treating pain can be equally dangerous as over-treating pain. States' lack of sharing of information in the name of state's rights and patient privacy is interfering with doctors' abilities to provide appropriate
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now