E-procurement


Questions and answers
1-Explain which factors will be impacted in transitioning a traditional department towards the use of an E-procurement system?
The application of the Internet in conjunction with other information communication tools and technologies in an effort of carrying out all procurement stages is what constitutes e-procurement. The process aims at integrating all procurement activities present in the traditional department and transforming them into an online service. The application is designed from end to end to capture and integrates all the activities of the department (Vaidya & Campbell, 2014). The procurement processes that are prone to change once the application of e-procurement is adopted include the search, sourcing, negotiating, ordering, receipt, and post-purchase activities. In a traditional department, paper files are used for tracking and keeping tabs on transactions. Once an e-procurement system is adopted, this action is replaced by electronic data that can be quickly changed and manipulated to make decisions that rhyme with the needs of the organization.
Planning and decision-making are also activities that are carried out manually in a traditional department (Davila, Gupta & Palmer, n.d.). With the adoption of an e-procurement system, these activities are heavily influenced by technology. For example, choosing a supplier does not rely on the previous relationship of the provider with influential individuals in the organization. On the contrary, a variety of metrics is fed into an e-procurement system that assists in making a decision that is free, fair and unbiased. Therefore, human factors are heavily influenced by the transition from a traditional department towards the use of an e-procurement system. The complexity of tasks is reduced once a third party is procured. In addition to this, cost factors are reduced based on the contestability prevalent in an e-procurement process. Asset specification factors are also achieved by the organization offering the best technology that meets the needs of the organizational requirements is contracted.
2-What factors influence the adoption of E-procurement? Which factor do you believe to be the most detrimental and why?
The adoption of e-procurement systems is influenced by two diverse factors; human and technological factors. On one hand, the human factors depend on the expertise and behavior of the people while, on the other, technological factors are influenced by the technologies in use (AlAwadhi & Morris, 2009).  The project management, the supplier adoption and end-user training and uptake are some prevalent human factors influencing the adoption of the system. On the other hand, technological factors involve the system to be adopted and implemented.  In this regard, critical factors that influence the performance of the system such as the security and authentication, integration and adoption constitute the technological factors. From the research of Dooley and Purchase (2006), the participation and intentions of the supplier are also among the dominant reasons affecting the adoption of e-procurement systems. A majority of providers enforce the need for adopting e-procurement systems in an effort of encouraging cost savings and enhance communication. A fundamental requirement for successful adoption and implementation of e-procurement systems is internal organizational support.
Among the critical success factors that influence the adoption of e-procurement services, the most detrimental is internal organizational support especially from the top management. The success of any technological system depends on how it is perceived by the members of the organization. When there lacks internal organizational support, the probability of failure of the system is high. Therefore, prior to adopting the technology, it is paramount to ensure that the personnel of the organization accepts it and is ready and willing to cooperate for the benefit of the firm. When a system is perceived to be a threat by the employees, they work to sabotage its operation, and this leads to failure of the system (AlAwadhi & Morris, 2009). It becomes costly implementing a system that is doomed to failure.
3-Discuss the differences between the three models of E-governance. Which model do you predict would benefit NYC and why?
The adoption of internet and web-based platforms and applications to give access to information and deliver governmental services to the citizens, agencies, employees, and government entities comprises the electronic management (Downey & Jones, 2012). E-governance is the use of ICTs strategically to deliver quality government services. The public services are offered online, and this is done to enhance transparency and accountability. E-governance models are distinguished from the way they offer services to the people. First is the broadcasting model that disseminates governance information using ICT and convergent media. The model aims at creating an informed citizenry for better decision-making (Davila, Gupta & Palmer, n.d.). Governmental activities are influenced by the participation of the citizens, their opinions and views.  Second is the critical flow model that channels information of value to a targeted audience. The concept of time and distance are made redundant when the information is hosted on a digital network (Downey, Ekstrom & Jones, 2011).  The comparative analysis model is used to mobilize people and, therefore, suitable for developing nations. In the e-advocacy model, the concerns and opinions of virtual teams are taken into account influencing global decisions. A directed and planned flow of information is adopted in the design in an effort of complementing real world actions. Lastly, the interactive service model opens a direct participation avenue for citizens in governance processes. Therefore, objectivity and transparency is decision-making is achieved.
For a city like New York, the interactive service model would be useful if adopted. Due to the smaller geography compared to an entire state, it is possible to involve directly citizens in governmental decision-making processes. New York City is a modern and digitally evolved city and thus ICT has the potential of unifying all the people in the network. Opinion polls, electro-voting and redressing grievances online are a possibility.
4-Discuss, the role of information security and information privacy, play in the move towards E-Government.
Public organizations face information security and privacy as the two significant challenges based on the role played by information technology in the administration. In the public sector, information technology systems must guarantee privacy, availability, confidentiality and integrity (Changchit, 2009). The success of these parameters depends on the implementation of security and privacy policies that are oriented towards achieving the concerns of the government in delivery its services. With increased online transactions, privacy becomes a concern. Privacy is the ability of an individual to exercise control over their personal information without surveillance and monitoring from either private or government institutions. It is privacy that enhances loyalty between the parties involved. The increased use of information collection devices such as smart phones and smart cards call for the need of privacy protection. If the collected information falls into the wrong hands, it is prone to exploitation and misuse.
            E-government is founded on the notion of transparency, accountability, and flexibility. These parameters are achieved through the availability and access to information and information technologies. Information privacy policies play a critical role in e-governments as they ensure a free and fair access and use of information technologies. The privacy policy adopted by any government stipulated how information from groups and individuals is collected, stored and communicated to others (Gayness Clark, Lang Beebe, Williams & Shepherd, 2009). For this reason, information privacy becomes the tool that regulates the acquisition, storage and dissemination of vital and critical information. Security of information is key to the stability and running of an e-government. Several parameters such as technical and economic, legal and regulatory as well as behavioral policies must be adopted (Changchit, 2009). To eliminate potential threats posed by unauthorized access and use of information, information security management must be taken.
5-What are some of the threats to information security and how would you control access violations or loss of data?
Human factors and technological factors are the two major categories of information security threats. The most prevalent threats are human threats since they are intentional and deliberate and well calculated and have and negative impact on the online service delivery. Vandalism, theft and software attacks are also other forms of human initiated information security threats. Other include unintentional threats arising from errors such as typographic errors. Information extortion and espionage are also human initiated threats. Other attacks occur on the network such as denial of service attacks and deviation of quality of service. The obsolescence of technology is also a detrimental threat to information security (Vaidya & Campbell, 2014).Technological factors include hardware and software errors and consequent failure.
 Violation and loss of data are controlled through the adoption and application of information security controls. To ensure that access is not violated, various practices should be adopted such as the use of strong passwords that are periodically changed (Vaidya & Campbell, 2014).  Information systems monitoring and reporting on the statistics also enforces the security. Network intrusion detection systems and application of firewalls also mitigates unauthorized access to information systems. Loss of data should be protected through the use of media backups that are stored in a secure location aware from the information source. The use of virus protections also reduces chances of data being corrupted. Where sensitive information such as personal and private information is acquired, encryption should be applied to the information in transit. With the current proliferation of technology, ensuring synchronized data stored in the cloud is the best approach to ensuring the security of the information (Fried, 1994).
 References
AlAwadhi, S., & Morris, A. (2009). Factors Influencing the Adoption of E-government    Services.Journal Of Software, 4(6). doi:10.4304/jsw.4.6.584-590 
Changchit, C. (2009). Privacy Governance, Law, and Growth Perspective in Security. Journal Of             Information Privacy And Security, 5(4), 1. doi:10.1080/15536548.2009.10855872
Davila, T., Gupta, M., & Palmer, R. Moving Procurement Systems to the Internet: The Adoption and Use of E-Procurement Technology Models. SSRN Journal. doi:10.2139/ssrn.323923
Downey, E., & Jones, M. (2012). Public service, governance, and Web 2.0 technologies.   Hershey, PA: Information Science Reference.
Downey, E., Ekstrom, C., & Jones, M. (2011). E-government website development. Hershey,       Pa.: Information Science Reference.
Fried, L. (1994). INFORMATION SECURITY AND NEW TECHNOLOGY Potential Threats and Solutions. Information Systems Management, 11(3), 57-63.             Doi:10.1080/07399019408964654
Gayness Clark, J., Lang Beebe, N., Williams, K., & Shepherd, L. (2009). Security and Privacy      Governance: Criteria for Systems Design. Journal Of Information Privacy And Security,            5(4), 3-30. Doi:10.1080/15536548.2009.10855873

Vaidya, K., & Campbell, J. (2014). A multidisciplinary approach to defining public e-       procurement and evaluating its impact on procurement efficiency. Inf Syst Front.      Doi:10.1007/s10796-014-9536-z 


EmoticonEmoticon