• Home
  • Information Resources Management Association
Information Resources Management Association

Information Resources Management Association

About

3,105
Publications
56,373
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,368
Citations
Introduction
Information Resources Management Association (IRMA) is a research-based professional organization dedicated to advancing the concepts and practices of information resources management in modern organizations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals.

Publications

Publications (3,105)
Chapter
This research presents the development of a critical success factor matrix for increasing positive user experience of hotel websites based upon user ratings. Firstly, a number of critical success factors for web usability have been identified through the initial literature review. Secondly, hotel websites were surveyed in terms of critical success...
Chapter
In recent years, all information about customers can be shared with employees by customer relations management in tourism establishments, and accordingly, all customer expectations can be met. As a result, producing customer loyalty can be possible. Customer relations management applications in tourism establishments is crucial with regards to comp...
Chapter
Information technology plays a significant role in tourism, but mainly as an informational tool. Ideally, the information search process on the Internet should try to encourage consumers to book and purchase travel services and products prior to leaving for their vacation, but cultural differences in booking on-line are found. The present study res...
Chapter
This paper presents the initial outcomes of a key scoping study undertaken to explore the role of augmented reality and motion detecting technologies in the context of Intangible Cultural Heritage (ICH) for museums related environments. Initial prototypes are in the form of an interactive infrared camera based application for children to engage wit...
Chapter
The cultural sector is made of a variety of firms (both public and private) whose primary economic value derives from their cultural value (Flin, Mearns, O'Connor, & Bryden, 2000). The focus in this chapter is on the organizations that manage cultural sites, with a specific attention to the interactions between cultural sector and tourism industry....
Chapter
This study builds a model to evaluate and select vendors of customer relationship management (CRM) system for the medical tourism industry from the viewpoint of medical tourism industry. Literature in related fields was reviewed, and the modified Delphi method was applied to find proper evaluation and selection criteria for the model. Then the anal...
Chapter
In a virtual space conveniently chosen, citizens of the Web can interact and develop social capital and empowerment, intended as the consciousness of possibilities to influence the social context and to improve it, by increasing capacity of taking reasoned decisions on problems and of adopting adequate behaviour to face them. The Web can be seen in...
Chapter
Full-text available
Developing their e-marketing strategy, Destination Marketing Organizations (DMOs) invest in the establishment of their Websites to provide extended accessibility, real-time information/services, and personalization capabilities. This chapter aims to review prior tourism studies that refer to Website evaluation by taking DMOs’ Websites as the focus...
Chapter
Travel and tourism is a booming sector of the 21st century world economy. Despite numerous positive trends, numerous critics deplore some developments in this industry. In an era of increasing leisure tourism or “part-time leisure tourism” tacked on to business trips, coming into contact with other cultures risks fading into the background. Therefo...
Chapter
Drawing on associated literature and empirical research, this paper examines the engagement and expertise of hotels in handling customer complaints. This is of considerable interest to practitioners and academics within the field of hospitality management. The study explores hotel management’s attitudes and practices toward handling customer compla...
Chapter
Society is experiencing unprecedented changes, largely attributable to the evolution of communication technologies, which are steadily reframing our way of life, and the methods we use to establish and maintain social relations. Museums are therefore facing numerous challenges, in general as a result of these developments: apps, open content, and t...
Chapter
It is widely accepted today that food is symbolically and culturally bounded, which make it also emblematic for cultural and creative industries, as well as entertainment and leisure. This is observed in the increasing use of food in media entertainment such as cooking shows and competitions but also in other variant forms such as culinary schools,...
Chapter
This paper establishes if using a comment card provides a reliable form of feedback regarding customer satisfaction in hotels. This exploratory study was conducted at the Jumeirah Beach Hotel-Dubai, UAE. They are a convenient way for guests to complain, make suggestions and praise. Managers use this input to make quick fixes and comfort distraught...
Chapter
The performance of commercial websites is a critical issue that has a significant effect on consumers’ online decision-making. This study develops and applies a fuzzy model to assess the performance of hotel websites. It presents a fuzzy decision-making approach to the evaluation of tourism website performance that integrates consumer perceptions w...
Chapter
This chapter extends the concept of place branding and applies it to the digital world of the Internet (place @-branding). Among the various environments of the complex digital universe of the Internet, the chapter deals in particular with (1) Websites as vehicles of images, representations, evaluations of places, and (2) social networks as spaces...
Chapter
This chapter provides a descriptive report on factors influencing the behaviour of European consumers, highlighting their similarities and differences, based on secondary data. The analysis focuses on the presentation of comparable data that could provide clusters of characteristics of consumption among the COBEREN partners. The authors concentrate...
Chapter
This chapter studies the application of information technology in tourism promotion, particularly through Internet. In the context of tourism management, this chapter penetrates different usage of Web technology to disseminate maximum level of information for tourism promotion. This chapter is designed to determine the conditions of Websites as wel...
Chapter
CSR has been a widely-researched concept during the last three decades. However, there is no agreement on its definition or its dimensions; antecedents and consequences and there is no comprehensive model for its analysis. The origins of CSR lie in philanthropy and the highest level of CSR is considered to involve philanthropic actions. CSR is a pe...
Chapter
In this chapter, the authors introduce the e-learning material that they developed using Three-Dimensional Virtual Reality (3D-VR) technology in cyber ethics education. They propose a new instructional method that teaches students to use three types of knowledge in their analyses of moral judgment problems: knowledge of ethical codes, ICT, and rati...
Chapter
This chapter explores theories and concepts of ethical decision making in SMEs and how individuality of entrepreneurs affects their organisations. In order to investigate the entrepreneurial ethical decision-making process, the chapter crossbreeds the concepts of greed and power, cognitive moral development, ethical ideologies, and individual psych...
Chapter
The purpose of this research is to develop a direct and concise perceived leader integrity instrument that is posed from a positive perspective. The integrity construct in this study is developed from the tradition of moral philosophy and virtue ethics. The integrity construct in this study incorporates two aspects of integrity found in the literat...
Chapter
The chapter discusses the specificities of organizational culture in healthcare environments, taking into account general managerial theories and their suitability to particular professional settings. The challenges of teamwork and the things to be particularly considered by decision-makers in the healthcare system are discussed and critically anal...
Chapter
This chapter studies the requirements for a wide range of healthcare information systems, including, but not limited to, clinical pathways management, patient record management, home care management, and medical personnel and resource management. The analysis concentrates on the description and management of medical activities, leaving aside the st...
Chapter
This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flo...
Chapter
Modern telemedicine offers to hospitals a whole range of opportunities to improve the appropriateness of their care provision, to offer new services to primary care and to contribute to patient engagement. In this chapter, the authors briefly discuss their approach to facilitate the collaborative production of region-wide telemedicine roadmaps invo...
Chapter
Cloud computing is one of the emerging technologies that has an increasing impact on both private and public sectors. It represents an on-demand service model for delivering computing resources ranging from storage and data access, via computation and software provisioning. This chapter describes an application of Cloud Computing in home healthcare...
Chapter
Full-text available
In this chapter, the authors discuss a Knowledge Economy-based approach to the inclusion of Persons with Disabilities (PwD). The approach, different from the traditional assistance model, considers PwD as active and valuable members of the present Knowledge Society, to be included in the active workforce. This is discussed with reference to a speci...
Chapter
The unprecedented impact of Information and Communication Technologies (ICTs) on nearly every facet of human endeavour has continued to attract individual and organizational interest to explore these technologies for specific cause. ICTs are increasingly being used in promoting democracy and human rights issues: to mobilize and strengthen solidarit...
Chapter
Full-text available
This chapter proposes that key features of New Public Management (NPM) in complex public service organisations, such as teaching hospitals, are less new than a reversal to Weberian hierarchy, Fordist concern with throughput rather than quality, Taylorist standardised performance criteria, and Foucauldian surveillance. While this judgement is severe...
Chapter
Semantic interoperability facilitates Health Care and Life Sciences (HCLS) systems in connecting stakeholders at various levels as well as ensuring seamless use of healthcare resources. Their scope ranges from local to regional, national and cross-border. The use of semantics in delivering interoperable solution for HCLS systems is weakened by fact...
Chapter
In modern day’s institutions, risk management plays a crucial role as it aims to minimize the likelihood of adverse events and contributes to improve the quality of services delivery. In health care, an effective risk management is only possible if supported by information systems that can produce high quality measures and meaningful risk indicator...
Chapter
The chapter discusses, on research-based findings, the particularities of culture in hospitals, in a cross-cultural perspective with a particular focus on the Polish case. The findings of the study point to the fact that exterior factors and perceptions have a decisive impact on the patient evaluation of the hospital experience, so hospitals should...
Chapter
The preponderant dilemma organisations confront currently is which way to homologate and superintend access for a broad mass of services and products and in parallel to preserve security and privacy. Information technology is rapidly changing, is inherently complex, and complexity kills security. There is an ongoing technical race to maintain secur...
Chapter
While it is common to use storage in a cloud-based manner, the question of true interoperability is rarely fully addressed. This question becomes even more relevant since the steadily growing amount of data that needs to be stored will supersede the capacity of a single system in terms of resources, availability, and network throughput quite soon....
Chapter
The adoption of Telematics medicine or Telemedicine marks an important structural change in the mode in which deployment of medical care is being routinely provided. It is not a matter of using more or less developed technologies but mainly a deep change to the way in which countries and governments decide to provide and manage their national healt...
Chapter
Vehicular ad hoc networks have been envisioned to be useful in road safety and commercial applications. In addition, in-vehicle capabilities could be used as a service to provide a variety of applications, for example, to provide real-time junction view of road intersections or to address traffic status for advanced traffic light control. In this w...
Chapter
Healthcare organizations are increasingly willing to develop more efficient and higher quality processes to combat the competition and enhance financial viability by adopting contemporary solutions such as Health Information Technology (HIT). However, technological failures occur and represent a contemporary organizational development priority resu...
Chapter
Cloud computing has recently received considerable attention, as a promising approach for delivering Information and Communication Technologies (ICT) services as a utility. In the process of providing these services it is necessary to improve the utilization of data centre resources which are operating in most dynamic workload environments. Datacen...
Chapter
This chapter presents a case study on rural e-municipalities in Kyrgyzstan as an enabling tool for facilitating and supporting democratic local governance. The authors examine the case based on their action research and discuss key findings in terms of challenges of implementing and sustaining ICT-enabled local governance observed throughout the li...
Chapter
The emergence of Software as a Service (SaaS) has made it possible to develop dynamic and complex business processes as eServices. The development of business processes as eServices (SaaS) can be assisted by the means of adaptive or agile development processes. The development of business processes in terms of SaaS require to perform SaaS requireme...
Chapter
Full-text available
Cloud Computing is one of the fast spreading technologies for providing utility-based IT services to its users. Large-scale virtualized datacenters are established in order to provide these services. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, datacenters hos...
Chapter
Change is endemic in modern business competition. In an age of globalization, with the rapid development of Internet technologies, changes occur at a much faster pace, and are also more unpredictable. Being agile in a turbulent environment has been ranked highly by executives in surveys of business issues conducted in past five years. Today nearly...
Chapter
The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for h...
Chapter
On-demand computing power at modest cost, tied with faster Internet accessibility in the Cloud has offered the future of Cloud libraries. This chapter presents a snapshot of what is happening in the arena of Cloud libraries. It presents the features, its promises, components that drive a Cloud library, users and the services, infrastructure, inform...
Chapter
Full-text available
When data mining aims to disclose information about the moral competences and values of individuals or groups – an undertaking we call ‘morality mining’ –, novel ethical problems emerge. These are only partially covered by the current debate on ethical data mining focusing on privacy with respect to discrimination, threats to autonomy, misuse of da...
Chapter
While computer ethics and information security courses try to teach computer misuse and unauthorized access as clear black and white examples, when examining the use and potentially misuse of URLs the discussion becomes less clear. This paper examines a number of computer use ethical scenarios focusing on the modification of URLs within Web browser...
Chapter
Full-text available
This chapter proposes a new Supply Chain Business Model in the Education domain and demonstrates how Education as a Service (EaaS) can be delivered. The implementation at the University of Greenwich (UoG) is used as a case study. Cloud computing business models are classified into eight Business Models; this classification is essential to the devel...
Chapter
This chapter analyses the role of cyber ethics and other related issues such as electronic commerce (e-commerce) and customers’ protection, privacy, anonymity, psychological and mental wealth-being. It focuses on consumerism cybercrimes such as consumer fraud, online deceptive advertisements, financial fraud and also on social cybercrimes such as p...
Chapter
Full-text available
With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today’s mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to est...
Chapter
This chapter elaborates on the impact and benefits Cloud Computing may have on Earth Observation. Earth Observation satellites generate in fact Tera- to Peta-bytes of data, and Cloud Computing provides many capabilities that allow an efficient storage and exploitation of such data. Several scenarios related to Earth Observation activities are analy...
Chapter
For the emerging field of cloud forensics, the development of validated and repeatable scientific processes for conducting cloud forensic investigations should include requirements that establish evidence collected as legally admissible. There is currently an uncertainty in the legal requirements for cloud forensics. Forensic investigations in the...
Chapter
This chapter discusses and surveys the concepts, demands, requirements, solutions, opportunities, challenges, and future perspectives and potential of Carrier Grade Cloud Computing (CGCC). This chapter also introduces a carrier grade distributed cloud computing architecture and discusses the benefits and advantages of carrier grade distributed clou...
Chapter
A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Amid the main criteria that formulate users’ trust is the way that that their privacy is protected. Indeed, privacy violation is an issue of great importance for active onlin...
Chapter
This paper concentrate on a proactive engagement with emerging information and communication technologies (ICTs) with the goal of an early identification of the ethical issues these technologies are likely to raise. After an overview of the emerging ICTs for the next future (leveraging the results of the EU funded project ETICA), the paper identify...
Chapter
Full-text available
Cloud computing introduces a new paradigm for software deployment, hosting, and service renting. Based on the XaaS architecture, a large number of users may share computing resources, platform services, and application software in a multi-tenancy approach. To ensure service availability, the system needs to support an advanced level of massive scal...
Chapter
Software testing in the cloud can reduce the need for hardware and software resources and offer a flexible and efficient alternative to the traditional software testing process. A major obstacle to the wider use of testing in the cloud is related to security issues. This chapter focuses on test generation techniques that combine concrete and symbol...
Chapter
Many organizations are adopting cloud services to reduce their computing cost and increase the flexibility of their IT infrastructure. As cloud services are moving to the mainstream to meet major computing needs, the issues of ownership and chain of custody of customer data are becoming primary responsibilities of providers. Therefore, security req...
Chapter
Data acquisition and data recovery are essential to any e-discovery or digital forensic process. However, these two aspects seem to be considerably difficult in a cloud-computing environment. The very nature of the Cloud raises a number of technical and organizational challenges, which renders traditional approaches and tools inapplicable. Resource...
Chapter
Full-text available
This chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, this work begins to examine cloud computing security-related questions, specifically how past security challenges are inherited o...
Chapter
This chapter investigates companies' disclosure alignment and transparency signaling within the 2011 CSR annual reports of 36 U.S. firms in the Global Forbes 2000. DICTION 6.0 was used for the text analysis. The study found that CSR reports are fairly similar to corporate financial annual reports but can be classified more accurately as a hybrid di...
Chapter
Today, there is a huge variety of script-centric approaches, APIs, and tools available to implement automated provisioning, deployment, and management of applications in the Cloud. The automation of all these aspects is key for reducing costs. However, most of these approaches are script-centric and provide proprietary solutions employing different...
Chapter
Big data is a topic of active research in the cloud community. With increasing demand for data storage in the cloud, study of data-intensive applications is becoming a primary focus. Data-intensive applications involve high CPU usage for processing large volumes of data on the scale of terabytes or petabytes. While some research exists for the perf...
Chapter
Hospital network is evolving towards a more integrated approach by interconnecting wireless technologies into backbone networks. Although various integrated network scenarios have been published in the networking literature, a generic hospital model has not yet been fully explored and it remains a challenging topic in practice. One of the problems...
Chapter
Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption o...
Chapter
This chapter examines the economic impact of the diffusion of a new technology as cloud computing. This will allow firms to rent computing power and storage from service providers, and to pay on demand, with a profound impact on the cost structure of all the industries, turning some of the fixed costs in marginal costs of production. Such a change...
Chapter
The chapter presents a specific niche dilemma regarding the ethical aspects of utilization of data gathered for one specific research for another research, which was not specified to the data suppliers (sample) at the time of gathering, or that the data suppliers were not even informed of the possibility of such occurrence. That dilemma of the reus...
Chapter
Research Medical Center is a regional medical center that meets the needs of residents of a rural area in the Midwest. It is part of a large healthcare system. The primary care hospital implemented the Electronic Health Record (EHR). The endeavor to implement Health IT applications including Computerized Physician Order Entry (CPOE), EHRs, nursing...
Chapter
With the global diffusion of cybercrime, the ever-growing market penetration of high-performance and low-cost personal digital devices, and the commercial success of cloud computing, the area of digital forensics is faced with various new challenges that must be taken seriously. In this chapter, the authors describe a novel approach to digital inve...
Chapter
Cloud Computing is the most promising computing paradigm that provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible, computing on a pay-as-you-go basis. With the growth and expansion of the Cloud services and participation of various services providers, the description of quality parameters and m...
Chapter
The debate about the moral status of corporations has been wide-ranging and complex. In this paper a way of structuring the debate is proposed. At the same time, arguments within the “corporate moral agency” debate are considered in relation to the notion of Artificial Moral Agency. The entire exercise points to the importance of philosophical prag...
Chapter
Globalization has placed modern organizations in tremendous competition locally and regionally across borders; thus, the ultimate goal of every organization is the same which is profitable survival. In order to make sure that this profitable survival goal does not come at the cost of harming others, guiding principles are needed to bring goodness a...
Chapter
Full-text available
Despite a growing adoption of cloud computing, law enforcement and the judicial system are unprepared to prosecute cloud-based crimes. This chapter illuminates legal problems in the United States for electronic discovery and digital forensics arising from cloud computing and argues that cloud computing challenges the process and product of electron...
Chapter
Administrative leadership of Wayburn Health System decided to move forward with a training program to address communication between healthcare professionals within their emergency center. After a few sentinel events where errors had occurred that compromised patient safety due to miscommunication amongst healthcare team members, hospital administra...
Chapter
The ethical crisis in business and information technology is very real. Countering this crisis by creating organizational cultures grounded in moral character is the challenge people face as leaders if they are to regain the respect and confidence of the public. As educators of future business and information technology leaders, how can educators p...
Chapter
This chapter seeks to identify useful game-theoretic insights concerning key issues of business ethics in emerging economies. The study considers four elements in this sequence: game theory, emerging economies, business ethics, and key issues. The chapter does not undertake formal modeling but rather emphasizes useful insights. Game theory provides...
Chapter
Testing is a critical phase in the software life-cycle. While small-scale component-wise testing is done routinely as part of development and maintenance of large-scale software, the system level testing of the whole software is much more problematic due to low level of coverage of potential usage scenarios by test cases and high costs associated w...
Chapter
This chapter explains how case studies can be used successfully in distance education to provide an authentic, interactive way to teach ethical behavior through critical analysis and decision-making while addressing ethical standards and theories. The creation and choice of case studies are key for optimum learning, and can reflect both the instruc...
Chapter
The aim of this chapter is to showcase the potential of new, Cloud-based, Information and Communication Technology (ICT) platforms for transport logistics chain management. The related literature is analysed from five perspectives. First, by examining supply chain issues relating to integration of core processes across organizational boundaries, th...
Chapter
As the use of online social networking (OSN) sites is increasing, data extraction from OSN profiles is providing researchers with a rich source of data. Data extraction is divided into non-automated and automated approaches. However, researchers face a variety of ethical challenges especially using automated data extraction approaches. In social ne...
Chapter
Emergency events are always very critical to manage as in most cases there is a human life risk. Such events could become even more serious when occurring in remote areas not equipped with adequate healthcare facilities, able to manage life risk. This is the case in many rural geographical areas. In such scenarios telemedicine can play a very impor...
Chapter
Cloud computing is changing the way corporate computing operates and forcing the rapid evolution of computing service delivery. It is being facilitated by numerous technological approaches and a variety of business models. Although utilizing the infrastructure of existing computing and networking technologies, different cloud service providers (CSP...
Chapter
Today, exposure to new and unfamiliar environments is a necessary part of daily life. Effective communication of location-based information through location-based services has become a key concern for cartographers, geographers, human-computer interaction and professional designers alike. Recently, much attention was directed towards Augmented Real...
Chapter
Research dealing with the motives of sports tourists from a marketer’s perspective remains underdeveloped. This chapter describes the phenomenon of sports tourism and aspires to examine with an empirical study the motives of winter and summer sports tourists. The first sample (n=339) was comprised of active as well as passive summer sports tourists...
Chapter
There is increasing uptake of telehealth for long-term conditions (LTCs). However, evidence of their effectiveness remains largely inconclusive. Similarly, success factors for implementation of telehealth into routine healthcare practice are not fully understood. The objectives of this chapter are to determine the effectiveness of telehealth; and t...
Chapter
This chapter summarizes the theoretical and empirical literature on attitudes toward bribery and then proceeds to examine the opinions of 1,483 Brazilians on the issue, using the data from the most recent World Values Survey. The study finds that although Brazilians are strongly opposed to bribe-taking in general their opposition is less than absol...
Chapter
Telehealth and telecare have been heralded as major mechanisms by which frail elderly people can continue to live at home but numerous pilot studies have not led to the adoption of these technologies as mainstream contributors to the health and social care of people in the community. This paper reviews why dissemination has proved difficult and con...
Chapter
Another new paradigm shift is in the offing and slowly becoming distinct from the amorphous shape of public administration. It is the ICT-blessed governance, or e-Governance. The adoption of ICTs and the new approach to management in symbiosis are e-Governance. E-governance speaks of a new way and style in every beat and pulse of the system of publ...
Chapter
In recent years, the use of the Blended Learning (BL) methods has experienced worldwide uptake and is responsible for enormous changes, not only in developed country education, but in developing country education, particularly sub-Saharan Africa. Given the role that blended learning can play in educational development, educational institutions, stu...
Chapter
The use of online methodologies to deliver coursework has become institutionalized in higher education. There is an urgent need to move beyond the question of which delivery model is most effective: face-to-face, fully online, or blended, and switch the focus to teaching pedagogy and strategies that effectively engage students in the learning proce...
Chapter
Blended learning is a well-known and successful instructional model used in higher education and K-12 schools (International Association for K-12 Online Learning, 2012; Watson, 2012). It is estimated that about 37 percent of school districts in the United States had students enrolled in technology-supported distance education courses during the 200...
Chapter
Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can u...
Chapter
The Internet has been playing a key role to prolifically reach the target market. Simultaneously, the implications of Relationship Marketing (RM) to establish, maintain and enhance competitive advantage in the traditional marketplace are widely recognized. However, because of the online, ongoing, and on time communication approach of the Internet (...
Chapter
Amlan Bhusan raises important questions in this chapter. To him, there is a growing academic consciousness, regarding the use of e-governance, to deliver social goods in a better way. This voice advocates that more needs to be done by public institutions, governments, and more importantly, the academia, to develop e-governance as an enabler for soc...