Shalini Kesar’s research while affiliated with Southern Utah University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (8)


E-government implementation challenges at local level: A comparative study of government and citizens' perspectives
  • Article

April 2011

·

120 Reads

·

23 Citations

Electronic Government an International Journal

·

Shalini Kesar

In this paper, we compare and contrast the issues facing citizens with those faced by managers responsible for e-government implementation. We report the findings of a case study of e-government implementation undertaken recently at a local government authority in the UK. We use the design-reality gap analysis framework based on seven 'ITPOSMO' dimensions proposed by Heeks. Our findings indicate that the success of e-government at local level requires a strong partnership between local government and citizens. The study results point to the lack of clear strategy at local authorities' level for changing the way the government interacts with citizens.


Is Cybercrime one of the weakest links in Electronic Government?

January 2011

·

45 Reads

·

3 Citations

Journal of International Commercial Law and Technology

This paper provides an insight to the increasing problem of cybercrime in the context of electronic government. It takes examples from the UK government to argue that it is no longer possible to just rely on technical controls while securing electronic government transactions. Reports and studies reflect that illicit acts such as cybercrime are predominantly the result of not only disregard for basic information security and but also lack of awareness about the importance of social issues associated with information technology. Consequently, focusing on the technical controls provides only a partial solution while managing cybercrime particularly in electronic government context.


Knowledge management within information security: The case of Barings Bank

June 2008

·

74 Reads

·

17 Citations

International Journal of Business Information Systems

Managing the growing problem of computer fraud within organisations has led researchers and practitioners to emphasise the need to take into account the 'social' aspects of information security. In addition, wider organisational issues such as lack of communication have been associated with computer fraud. In trying to minimise 'opportunities' for computer fraud, this paper argues that managers' awareness and knowledge of how an organisation functions can significantly affect the effectiveness of management information security. This is because managers can send 'cues' to other employees, which influence how the latter perceive and abide by information security and other policies and procedures in their daily activities. Such perception and application are examples of tacit knowledge development and use. In developing the argument, this paper uses the case of Barings Bank together with Mintzberg's five functions of an organisation. Thus it contributes in effective management of information security from a knowledge management perspective.


E-Government Implementation Challenges at Local Level: A Citizens' Centric Perspective.

January 2008

·

28 Reads

·

7 Citations

Majority of the studies reported in e-government literature identify the challenges involved in any e-government implementation from technical or project implementation perspective. In contrast, in this study, we take the citizen centric perspective to identify the factors and issues that influence the success of e-government implementation at local level. In this paper, we report the findings of a case study of e-government implementation undertaken recently at a local government authority in the UK. We conducted the study in two phases. During the first phase, we interviewed operational and managerial staff members at a local government authority in the UK who were involved with the e-government implementation. In the second phase, we interviewed 88 citizens to understand the issues and perceptions about egovernment services available to them. We use the design-reality gap analysis framework based on seven 'ITPOSMO' dimensions proposed by Heeks to compare and contrast the issues from citizens? perspective and those from government perspective. Our findings indicate that the success of e-government at local level requires a strong partnership between local government and citizens. The study results point to lack of clear strategy at local authorities? level for changing the way the government interacts with citizens. This paper contributes to our understanding of issues involved in implementing egovernment at local level both from citizens? perspective and government perspective.


E-government implementation challenges in the UK: A case study at the Trading Standards Department

January 2007

·

62 Reads

·

16 Citations

Electronic Government an International Journal

Governments in many countries have invested significantly in building electronic infrastructures to support e-government initiatives. However, there is mixed evidence about the success of e-government initiatives. In this paper, we report the findings of a case study of e-government implementation undertaken recently at a local government authority in the UK. Despite the success of such efforts at National Health Services Direct (NHSD) in the UK, local authorities in the UK have not been able to replicate the success of e-government initiatives at NHSD. Consequently, local authorities in the UK have largely failed to meet the expectations of the UK government. We use the framework proposed by Heeks to understand the underlying reasons for the failure of local authorities to implement e-government. Using a case study at a local authority in the UK, this paper contributes to our understanding about successful implementation and adoption of e-government initiatives at the local level.


Computer misuse: search for a solution
  • Conference Paper
  • Full-text available

August 1999

·

986 Reads

This paper argues that, in order to manage computer misuse, a greater understanding of its origins along with its effects is imperative. Further, it argues that individual attitudes and social norms with respect to illicit behaviour must be examined in the context of the personality factors, work situation and opportunities that may exist within organisations. While conducting the argument, the paper uses the theory of reasoned action (Fishbein and Ajzen, 1975). The theory is used to interpret computer misuse in two case studies: Barings Bank (a merchant bank) and the Centre for Malaria Research (CEFORMA) in Latin America. The paper draws on the findings in the two case studies to identify some core ethical principles that organisations need to adopt in order to minimise or prevent computer misuse

Download

Developing Ethical Practices to Minimize Computer Misuse

October 1998

·

464 Reads

·

15 Citations

Various researchers have suggested the need to develop sound ethical information technology practices to combat the increased incidence of computer misuse. Relating to the ubiquity of information technology, this article presents a basis to understand the nature of computer misuse. Such an analysis will help in developing ethical practices to minimize computer misuse. Finally, this article argues that by addressing ethical issues at both formal and informal levels, the risks associated with information technology usage can be minimized.


Developing ethical practices to minimise computer misuse

July 1997

·

167 Reads

·

6 Citations

Various researchers have suggested the need to develop sound ethical information technology practices to combat the increased incidence of computer misuse. Relating to the ubiquity of information technology, the paper presents a basis to understand the nature of computer misuse. Such an analysis will help in developing ethical practices so as to minimise computer misuse. Finally, the paper argues that by addressing ethical issues at both formal and informal levels, the risks associated with information technology usage can be minimised

Citations (7)


... After all, e-government is not an automatic solution, rather a combination of technical, social and cultural shifts which need a data protection legal framework. Effort must be made to ensure that people's information is secured and protected (Kesar, 2011). ...

Reference:

EMPIRICAL INVESTIGATION OF FACTORS THAT IMPACT E-GOVERNMENT ADOPTION IN NIGERIA
Is Cybercrime one of the weakest links in Electronic Government?
  • Citing Article
  • January 2011

Journal of International Commercial Law and Technology

... Against this backdrop, a growing number of researchers have turned their attention to the security problems posed by employee computer crime (Straub, 1990;Kesar and Rogerson, 1998). However, to date, there has been a lack of insight into the relationship between the actual behaviour of offenders during the perpetration of computer crime, and the organisational context in which such behaviour takes place. ...

Developing Ethical Practices to Minimize Computer Misuse

... A large number of studies have focused on technology implementation in private (e.g: Akkermans & van Helden, 2002;Al-Mashari & Al-Mudimigh, 2003;Cooper & Zmud, 1990;Markus, 1983) and government (e.g: Jain & Kesar, 2008;Scott, Golden, & Hughes, 2004;Shareef, Archer, Kumar, & Kumar, 2010;Weerakkody, Dwivedi, Brooks, & Williams, 2007) organizations. The studies concentrated on single or multiple organizations context and at different level of information technology (IT) implementation. ...

E-Government Implementation Challenges at Local Level: A Citizens' Centric Perspective.
  • Citing Conference Paper
  • January 2008

... KM has been widely implemented in organizations to improve efficiency, performance, and competitiveness. However, information security is mostly neglected from the KM perspective [3]. Therefore, it is vital to have the KM practices that take information security into account. ...

Knowledge management within information security: The case of Barings Bank
  • Citing Article
  • June 2008

International Journal of Business Information Systems

... One of the constant problems reported in the nationwide government digitization agenda is the lingering challenges of successful local-level implementation (Freeman and Park, 2015;Kesar and Jain, 2007). A considerable number of studies have investigated this problem, which generally fall into two domains: issues in local entities and issues in the strategic decision-making process. ...

E-government implementation challenges in the UK: A case study at the Trading Standards Department
  • Citing Article
  • January 2007

Electronic Government an International Journal

... However, most of the existing studies (e.g., Jain & Kesar 2011;Nkwe 2012;Nkohkwo & Islam 2013;UN E-Government Survey, 2016;Mosud & Govender 2017;Alassaf et al. 2020;Elmansori & Ishak 2021) focus on the challenges and factors affecting electronic government implementations in the public sectors of developing countries. But only a few explore, in particular, the important roles and responsibilities of the stakeholders during different phases of the implementation cycle of the egovernment initiative (Ashaye & Irani 2019;Alenizi 2021). ...

E-government implementation challenges at local level: A comparative study of government and citizens' perspectives
  • Citing Article
  • April 2011

Electronic Government an International Journal

... De nombreuses études montrent que le désir des utilisateurs de respecter les règles de sécurité des informations n'est pas très "passionnel" (Goodhue et Straub, 1989 ;Parker, 1998). Ceci peut être une source de faiblesse organisationnelle, qui peut être réduite en développant des comportements plus sécuritaires grâce à : • la morale et l'éthique (Kowalski, 1990 ;Leiwo et Heikkuri, 1998 ;Kesar et Rogerson, 1997) ; • des codes d'éthique organisationnelle et professionnelle (Harrington, 1996 ;Straub et al., 1984 ;Parker, 1998) ; • des éléments dissuasifs comme par exemple ceux présentés dans la théorie générale de la dissuasion (Straub, 1990) ; Selon Siponen, (2000), si les guides de sécurité et/ou les normes externes sont trop contraignants et ne conduisent qu'à des prescriptions, ils peuvent constituer la source de risques bien plus importants sous la forme d'une "implication négative", c'est-à-dire des pressions ou irritations qui pourraient réduire l'efficacité du travail et même produire de la résistance, des comportements non éthiques, ou d'autres comportements indésirables. ...

Developing ethical practices to minimise computer misuse