{"title":"m-Government maturity model: A qualitative investigation","authors":"Dlamini Diteboho Refiloe, Mpekoa Noluntu","doi":"10.23919/I-SOCIETY.2017.8354678","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354678","url":null,"abstract":"Mobile government is gaining significant attention worldwide. Mobile phone penetration offers government a number of opportunities, including offering governments services to citizens via these ambiguous devices. This phenomenon called m-Government is a strategy which involves the use of all kinds of wireless and mobile technologies, applications and devices for improving service delivery to the parties involved in m-Government including citizens, businesses and all government divisions. The main aim of the study is to develop a mobile Government Maturity Model that can be used as an assessment tool to evaluate mobile services offered by government departments. This study examined the benefits offered by mobile government and also conducted an in-depth literature review on mobile government maturity models. Maturity models that have been developed by other researchers were translated, interpreted, compared and synthesized and a new mobile government maturity model is proposed. The new maturity model is contextualized for the Free State government in South Africa.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quasi-physical approach to forming the methodological and theoretical base of infosphere development","authors":"M. Polyakov, I. Khanin, Nikolai Bormatenko","doi":"10.23919/I-SOCIETY.2017.8354669","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354669","url":null,"abstract":"“Information technologies” today is an application of physical technologies to the information practices. Technologies of information have not started yet. To understand the infosphere development, we offer the model of Paradigmatic Innovation Development developed on the base of quasi-physical approach to non-physical phenomena.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security vulnerabilities in Javascript hotpatching in iOS with a commercial and open-source tool","authors":"S. Ford, Aspen Olmsted","doi":"10.23919/I-SOCIETY.2017.8354682","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354682","url":null,"abstract":"The need for developers to be able to update mobile apps immediately on discovery of a critical is something the Apple iOS software patching system does not allow through their traditional app patching lifecycle. Two tools have been developed to solve this problem, one commercial and one open-source. Both employ JavaScript and dynamic code downloads and provide a method for users to receive immediate updates, but both have the potential to be abused and open the user to multiple security vulnerabilities. This paper will discuss the how tools JSPatch and Rollout.io, open-source and commercial respectively, enable quick updates but also expose users to multiple security vulnerabilities.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PhD and doctorate consortium","authors":"C. Shoniregun","doi":"10.23919/i-society.2017.8354660","DOIUrl":"https://doi.org/10.23919/i-society.2017.8354660","url":null,"abstract":"Provides an abstract for each of the tutorial presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}