pub

The Danger of False Teachers (Parable of the Publican and Pharisee)

“Be imitators of me, as I am of Christ.” (1 Corinthians 11:1) What this Episode is About: The Pharisee fasted, prayed, and gave to the poor. He did all the right things we're supposed to do. So what exactly did he do wrong? The Triodion Period begins with the Parable of the Publican and Pharisee to ground us in the righteousness of God rather than our own pride and delusion. Because, like the Pharisee, we don't always see ourselves clearly. We can easily lead ourselves astray. Self-deception happens when we turn inward, trusting in ourselves and our own abilities to evaluate our own righteousness, especially against the perceived lack of righteousness (or even just rightness) in others. And the antidote to this self-deception is to turn to someone outside of us who can redirect our hearts and minds toward the One who Is. Not a false teacher, but a true teacher. Just like Saint Paul guided Saint Timothy. As always, we've prepared a FREE downloadable workbook to help you act on what you'll learn: https://mailchi.mp/goarch/bethebee165




pub

The Publican and Pharisee

Imposters and Evil Men!




pub

The Publican and the Pharisee

Two people entered the Temple. One said "What a lucky God you are to have a follower like me!" The other said "What a lucky man I am to have a God like You!"




pub

Republicans win control of the US House of Representatives




pub

Exxon’s chief has a warning for Republicans




pub

The complexities of Alex Salmond in public and in private

Much is known about the public life of Alex Salmond - but far less about the man away from the spotlight.




pub

Edinburgh museum to reopen after public backlash

It will reopen on 2 December after the council received "passionate feedback" for the public.




pub

Tourism fears over public toilet closures

More than 30 public toilets in Ceredigion could close to cut costs.




pub

BBC News | Latest Published Stories | UK Edition




pub

Pub closure warning: Many landlords only make 12p a pint

The boss of Britain's biggest pubs group urges the chancellor to extend business rates relief.




pub

Pub landlord fears Budget may cost him £24K a year

The new Labour government is expected to announce spending cuts and tax rises in Wednesday's Budget.




pub

Former pub site to become 68-bedroom care home

Plans to demolish the former Wordsworth Tavern in Parson Cross are approved by the council.




pub

12,000 pubs for one man from Penkhull

73-year-old Rob Cocker from Penkhull has now had a drink in 12,000 pubs nationwide.




pub

Home and pub almost destroyed in lorry crash

The pub had been sold and new owners were ready to move in before the crash that also left a takeaway damaged.





pub

Is British public life dominated by men?

Today in the Guardian, features writer Kira Cochrane has produced a story that is already being widely quoted on the numbers (or lack thereof) of visible women in the media. "In a typical month, 78% of newspaper articles are written by men, 72% of Question Time contributors are men and 84% of reporters and guests on Radio 4's Today show are men. Where are all the women?"

On the one hand, this story is decently written and based on a sound idea. Not least because rather than write an article on lazy assumptions of representations, it goes to the bother of looking at whether the actual numbers match up with the perceptions of the author. This is a good place to start in any conversation about representation and is often overlooked in media or social commentary.

That said, there is a huge difference between "counting numbers" and "producing statistics". Or, indeed, evidence. My problem is not with the article per se, which after all is simply a feature for the Life & Style section of the Grauniad, but rather with the reception it's had on Twitter and elsewhere as if it is le dernier cri in proof. The article is an improvement on most other articles of its kind. But it is also at best a beginning of something that could, and should, be examined further in a way which is compatible with well-designed research.

But the widespread acclaim indicates there is a danger of not taking the piece any further, and adopting its conclusions wholesale as if it was a well-designed in-depth study. It's not (yet). It could be. For example, the article starts with "In a typical month" - to be unimpeachable, you must establish in what way the months selected were "typical".

Because the numbers match so closely with the author's a priori assumptions, care should be taken to assure the reader that the shows selected do not comprise a skewed sample. (Actually, this should be done anyway.) We need to know what the spread of shows on television and radio are that are considered topical, political, or sufficiently serious. Why was Question Time included, and Loose Women excluded? I don't think one is especially more in-depth or topical than the other. Why is Have I Got News For You considered, which is a comedy show, and Moral Maze not, which is a serious radio programme featuring many regular women panellists and guests? Or the Radio 4 News Quiz, hosted by Sandi Toksvig and featuring many women as guests? What about Women's Hour?

Size, as ever, matters. What are the audience sizes for the shows, since clearly that is important? So, too, does sampling. Since it's presumably not practical or useful to count all appearances on all media, there needs to be a way of assuring that the ones considered in such a study comprise a representative sample of media, audience types, and audience sizes. This is something almost no examination of media topics outside academia bother to do (and many inside don't do it either). But if the shows can not be shown to be representative, the stud's conclusions could be accused of being skewed, and the results not taken seriously.

The title of the article, with its unexplored "why?" also presents the danger of interpreting an outcome as if it is the same as the opportunity. Why, indeed, should there be more women on Question Time, when the percentage of female MPs is only 22%? This surely this is a problem that needs to be addressed at root level (why are there not more women in government, considered for such positions, or running for them?) and not by whingeing about token women on politics shows.

The reaction to women going on some of these shows can be extremely negative, which makes other women considering whether to appear think twice. Remember when Fern Britton appeared on Question Time, and the furore over her opening her mouth on topics other than what we thought she should talk about? I was asked to go on QT last year and turned it down because I expected much the same reaction. Would a similarly placed man in media have had the same dismissive reception as Britton, particularly from women like Amanda Platell perceiving them as "lightweight"?

Similarly, the format of the Today programme on Radio 4 is extremely off-putting. Would you like to be shouted at for two minutes first thing in the morning on a show that prides itself on manufacturing controversy, or have a reasonable discussion over on Women's Hour? That, incidentally, is the question more-or-less as it has been put to me by the PR folks at Orion in the past. Come on, it's not even a contest which most women (and men) would choose given the option.

Age is also part of the mix. As one twitter correspondent (@petehague) commented, "I think that the entire debate misses the point that experienced commentators represent past gender policies ... i.e. if you want to get a professor of economics on TV, your selection is influenced by undergraduate gender balance decades ago." And not only the undergrad balance, but especially the percentage making it through study to professorships. David Starkey and his ilk are still rocking up peddling their schtick because, well, the women with the best and most cogent arguments to counter him are not at his level of academic or media experience yet. This phenomenon is almost certainly at work outside the academia bubble as well. And given the continuation of the trend in which women for various reasons choose family or life balance over single-minded pursuit of their careers, it may well never happen.

Finally, we must ask why it is women in media, even ones like say, Laurie Penny, who seem committed to an ideal of being a political writer, end up doing pieces about dating and handbags. Is it because when such assignments are offered, writers would rather take the job than turn it down? And does this, over time, contribute to an impression that anyone who has done so is destined to "lack gravitas"? There is a pink ghetto even - no, especially - at the Guardian. Isn't it ironic that Cochrane's piece is in the Life & Style section, rather than, say, Comment Is Free? On the same day when a man's thoughts on his Movember 'tache does get a spot in CiF?

So in short, while I broadly agree with Cochrane's thesis that it would be nice to see more women on shows like Question Time and Have I Got News For You, I'm not sure the critical applause is warranted. Yet. And I don't think it constitutes "proof" much at all apart from being about those shows on those days. Interesting? Yes. Generalisable to all media at all times? No. The difference between anecdotes and sampling is subtle (perhaps too much so for most media) but crucial.

You may be wondering why this matters on an issue in which most people are in agreement. It matters because if an argument is seen to be slapdash or half-baked, it throws the conclusions into doubt regardless of how worthy they are. It matters because for there to be change it's important to know the real and not imagined extent of the problem. And it matters because if something is worth doing, it's worth doing right. There's a germ of an interesting idea in there. The real question is what is to be done with it?




pub

Court ruling conceals local government records from the public

Decision creates incentives for more secrecy




pub

WSO2 Stratos - Platform-as-a-Service for private and public cloud

Yesterday we announced something I believe is a game-changer: WSO2 Stratos. What is Stratos?

WSO2 Stratos is a complete SOA and developer platform offered as a self-service, multi-tenant, elastic runtime for private and public cloud infrastructures.
What that means is that our complete SOA platform - now enhanced with Tomcat and Webapp support - is available as a  "cloud native" runtime that you can either use on the Web (yes - you can try it out right now), on Amazon VPC, or on your own internal private cloud based on Ubuntu Enterprise Cloud, Eucalyptus and (coming soon) vmWare vSphere. It is a complete Platform-as-a-Service for private and public clouds.

I'll be writing more about Stratos over the coming weeks and months, and I'll also provide links and tweets to other Stratos blogs, but in this blog I want to simply answer three questions:

  1. I'm already talking to {vmWare, Eucalyptus, Ubuntu, Savvis, Joyent} about private cloud - what does WSO2 add that they don't have?
  2. What is the difference between Stratos and the Cloud Images that WSO2 already ships?
  3. Why would I choose WSO2 over the other vendors offering Platform-as-a-Service?
In order to answer the first question, lets look at the cloud computing space, which is most easily divided up into:
  • Infrastructure-as-a-Service (IaaS): this is where Amazon, Eucalyptus, vmWare, Saavis and Joyent play
  • Platform-as-a-Service (PaaS): Google App Engine, vmForce, Tibco Silver and now WSO2 Stratos play in this space.
  • Software-as-a-Service (SaaS): Google Apps, Google Mail, Microsoft Office Live, Salesforce, SugarOnDemand - these and many more make up the SaaS category.
To generalize wildly, most people talking about public cloud today are talking about SaaS. And most people talking about private cloud today are talking about IaaS.

SaaS is fantastic for quick productivity and low cost. WSO2 uses Google Apps, Sugar on Demand and several other SaaS apps. But SaaS doesn't create competitive advantage. Mule also uses Google Apps. They may well use Salesforce. SaaS cannot produce competitive advantage because your competitors get access to exactly the same low-cost services you do. In order to create competitive advantage you need to build as well as buy. For example, we use our Mashup Server together with our Sugar Business Messaging Adapter to provide insight and management of our pipeline that goes beyond what Sugar offers.

IaaS is of course a great basis to build apps. But it's just infrastructure. Yes - you get your VM hosted quicker. But someone has to create a useful VM. And that is where PaaS comes in. PaaS is how to speed up cloud development.

What does Stratos give you on top of an IaaS? It gives you an Application Server, Registry, Identity Server, Portal, ESB, Business Activity Monitor and Mashup Server. And it gives you these as-a-Service: completely self-service, elasticly scalable, and granularly metered and monitored. Someone in your team needs an ESB - they can provision one for themselves instantly. And because it's multi-tenant, it costs nothing to run until it gets used. How do you know how it's used? The metering and monitoring tells you exactly how much each tenant uses.

2. What is the difference between Stratos and the existing WSO2 Cloud Images?

The cloud images we started shipping in December are not Cloud Native. Stratos is Cloud Native. In practice, this means that when you log into Stratos (go on try it now) you can instantly provision your own domain, together with a set of Stratos services. This saves memory - instead of allocating a new VM and minimum half a gigabyte of memory to each new server you get a new ESB with zero extra memory cost. And it's much easier. The new ESB will automatically be governed and monitored. It's automatically elastically clustered.

3. Why would I choose WSO2 over other PaaS vendors?

Firstly, if you look at PaaS as a whole there is a huge divide between Public PaaS and Private PaaS. The public PaaS vendors simply don't offer private options. You can't run force.com or Google App Engine applications internally, even if you want to. WSO2 bridges that gap with a PaaS you can use in the public Web, on a virtual private cloud, or on premises.

The second big differentiator between WSO2 and the existing PaaS offerings is the architecture. Mostly PaaS is a way of building webapps. WSO2 offers a complete enterprise architecture - governance, business process, integration, portal, identity and mashups. And we support the common Enterprise Programming Model (not just Java, WebApp, JAX-WS, but also BPEL, XSLT, XPath, Google Gadgets, WSDL, etc). The only other PaaS that I know of that offers a full Enterprise architecture is Tibco Silver.

The third and most important differentiator is about lock-in. Software vendors love lock-in - and Cloud vendors love it even more. So if you code to Google App Engine, you are tied into Google's identity model, Google's Bigtable, etc. If you code to force.com or vmForce - you are tied to force's infrastructure services. If you code to Tibco Silver, you are tied to Tibco. WSO2 fights this in three ways:
  • No code lock-in: we use standards-based coding (WAR, JAX-WS, POJO) and Stratos is 100% Apache License Open Source.
  • No model lock-in: we use standards-based services: 
    • Identity is based on OpenID, OAuth, XACML, WS-Trust
    • Registry is based on AtomPub and REST
    • Business Process is based on BPEL, etc
  • No hosting lock-in: you can take you apps and data from our public PaaS and re-deploy internally or on your own virtual private cloud anytime you like.
I hope you found this a useful introduction to Stratos. If you want more information, contact me paul@wso2.com, or check out the Stratos website or code.




pub

Translating notary terms 2: What are public-form and private-form notarial acts?

A public-form notarial act is a document drafted by a notary that contains the entire notarial act. It is narrated from the notary’s perspective and includes all the details and circumstances of the act. All Spanish notarial acts are in public form (documents elevados a público). In England and Wales, notarial acts are usually in […]




pub

Translating notary terms 3: How to translate the names of Spanish public-form notarial acts into English

This post looks at how to translate the names of the two* main types of public-form Spanish notarial acts, escrituras públicas and actas notariales. It also identifies handy language to use in translations of them. Escritura pública An escritura pública records an act executed before a notary. How you translate the name of an escritura […]








pub

Georgia vs. Public.Resource.org: The Morning After

by Bashar H. Malkawi Copyright is an engine for knowledge. Although copyright creates monopoly, it should not be considered as a good in itself, but as a tool which can be used to achieve desirable objectives in society. Against the




pub

Journï¿œes parlementaires, campus rï¿œgionaux : La Rï¿œpublique en marche va dï¿œpenser prï¿œs d'un million d'euros pour sa rentrï¿œe

C'est la rentrᅵe politique. Et qui dit rentrᅵe, dit universitᅵ d'ᅵtᅵ. Cette annᅵe, la Rᅵpublique en marche a vu les choses en grand en organisant ᅵ la fois des journᅵes...




pub

Selon Le Canard enchaᅵnᅵ, le gouvernement Castex est le plus coᅵteux de l'histoire de la Ve Rᅵpublique (185 millions d'euros par an)

L'information est passï¿œe inaperï¿œue mais elle ne manque pas de sel. Alors que la gestion de la crise du covid-19 par le gouvernement est trï¿œs contestï¿œe (au retard dans la livraison de masques s'ajoute...




pub

Urban public space environment design based on intelligent algorithm and fuzzy control

With the development of urban construction, its spatial evolution is also influenced by behavioural actors such as enterprises, residents, and environmental factors, leading to some decision-making behaviours that are not conducive to urban public space and environmental design. At the same time, some cities are vulnerable to various factors such as distance factors, transportation factors, and human psychological factors during the construction of public areas, resulting in a decline in the quality of urban human settlements. Urban public space is the guarantee of urban life. For this, in order to standardise urban public space and improve the quality of urban living environment, the standardisation of the environment of urban public space is required. The rapid development of intelligent algorithms and fuzzy control provides technical support for the environmental design of urban public spaces. Through the modelling of intelligent algorithms and the construction of fuzzy space, it can meet the diverse.




pub

Navigating the digital frontier: a systematic review of digital governance's determinants in public administration

The aim of the study is to examine the determinants of digitalisation in public sector. This research is particularly relevant as digital transformation has become a crucial factor in modernising public sector and enhancing service delivery to citizens. The method of the systematic literature review (SLR) was implemented by searching documents on the Scopus database. The initial research reached the 7902 documents and after specifying the keywords the authors found 207 relevant documents. Finally; after the careful read of their abstracts and the use of inclusion and exclusion criteria; the most cited and relevant 32 papers constituted the final sample. Findings highlighted the focus of the literature on technological factors such as the sense of trust and safety as well as the ease of use in the adoption of digital governance; emphasising the need for effective; trustworthy and user-friendly digital services. The most discussed internal factors were leadership and organisational culture. The study offers a deeper understanding of the factors that shape the successful implementation of digital governance initiatives.




pub

e-HR and Employee Self Service: A Case Study of a Victorian Public Sector Organisation




pub

Evaluation of Web Pages as a Tool in Public Relations




pub

Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use




pub

A Memory Optimized Public-Key Crypto Algorithm Using Modified Modular Exponentiation (MME)  




pub

Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model




pub

The Concept of an Unstructured Book and the Software to Publish and Read it




pub

The Social Cost of the Integration of Information and Communication Technologies, Information, Education, and Communication on the Young of the Republic of Mauritius




pub

IT Control Objectives for Implementing the Public Finance Management Act in South Africa




pub

A Data Driven Conceptual Analysis of Globalization — Cultural Affects and Hofstedian Organizational Frames: The Slovak Republic Example




pub

Curriculum Construction and Custom Publishing – An Academic Perspective




pub

Changes in Public Institutions as a Function of Technology and Its Impact on Society

Aim/Purpose: The purpose of this article is to establish the different impacts of technological changes in institutions generating irrevocable changes in today’s society. Background: Technological changes have had a positive impact on many aspects of everyday life today, and it is natural that both public and private institutions benefit from this reality. Methodology: The research method used is based on the explanatory approach, through the documentary review of secondary sources and research works. Contribution: The implementation of electronic government in Ecuador is presented as a direct consequence of these technological developments with ways to direct and govern a country, which leads to competitive advantages in a world that is increasingly globalized. Findings: In the institutions the only permanent thing is change, for which the changing and evolving fact that the public and private institutions of today must have is highlighted. Recommendations for Practitioners: Results can inform to users the importance of the “new government” in a practical level. Recommendation for Researchers: The influence of technology on how to govern and if this in some way improves the functioning of the State. Impact on Society: Technological developments, which leads competitive advantages in a world that is increasingly globalized. Future Research: Create discussion and have a starting point to compare the influence of technological government in different parts of the world.




pub

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




pub

A Methodology for Increasing Business Process Maturity in Public Sector




pub

Critical Success Factors for ERP Systems Implementation in Public Administration




pub

The Survey of Information Systems in Public Administration in Poland




pub

Change management in information systems projects for public organizations

It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work.




pub

Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector

Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature.




pub

Knowledge Sharing Process and Innovation Success: Evidence from Public Organisations in Southern Nigeria

Aim/Purpose: This study investigates the relationship between knowledge sharing process and innovation success with specific emphasis on tacit knowledge. Based on the literature review, we hypothesised that knowledge donating and collecting have a positive relationship with innovation success. Methodology: The hypotheses were empirically tested using the partial least square path modelling with data collected from twelve state-owned public organisations operating in Southern Nigeria. Contribution: The research made distinct empirical contributions to the burgeoning literature on knowledge sharing and innovation from the public sector and developing country context. Findings: Knowledge donating and collecting contribute to innovation success positively and significantly. Knowledge donating effect on innovation success was found to be more significantly positive than the effect of knowledge collecting on innovation success. Recommendations for Practitioners: Public organisations should promote a supportive culture to spur innovation through the frequent share of experiences, information and skills among the various knowledge actors. Public managers should convey the importance of knowledge sharing and its value to knowledge users in clear terms and attend to creating conditions or contexts that encourage people to share knowledge freely and willingly with others. It is apt to improve organisational commitment and support for knowledge sharing activities such as mentorship programs, workshops, conferences, seminars and other related training and development programs in order to provide opportunities for employees to develop innovation competencies from the transfer of tacit knowledge developed over time from experience. To optimise innovation outcomes from knowledge sharing practices, knowledge sharing should be in tandem with the industry or global best practices. Future Research: Future studies should add interviews to provide depth in terms of insights and substance to the questionnaire, and may extend to public organisation with different ownership structure.




pub

Social Media Use and Its Effect on Knowledge Sharing: Evidence from Public Organisations in Delta State, Nigeria

Aim/Purpose: This study investigates social media use and its effect on knowledge sharing. Based on the review of related literature, we hypothesised that social media use has a significant effect on outward and inward knowledge sharing. Background: While the notion of social media use in work organisations has been progressively developed, empirical studies linking social media to the context of knowledge sharing have only begun to emerge. Even so, literature on social media use and its impact on public organisation is still tentative and remains a developing area. Methodology: The partial least square method was utilised in testing of hypotheses with data collected from 103 employees, who by virtue of their position and job function(s) interface with the public for the purpose of sharing knowledge via the social media space. Contribution: The study made contributions to the social knowledge management literature in two ways. First, the study developed a research model that links social media use to the two distinct dimensions of knowledge sharing. Second, the study provides a quantitative approach, where statistical techniques were applied to validate the social media use and knowledge sharing link. Findings: Statistically, the public organisations utilise social media partly for knowledge sharing, with its effect being significant on outward knowledge sharing and insignificant on inward knowledge sharing. This indicates that social media were deployed mainly for information dissemination “outward knowledge sharing” and not for stakeholders’ feedback and interaction “inward knowledge sharing”. Recommendations for Practitioners: Public organisations should develop a policy framework and guidelines for social media use to encourage the full use of this technology to inform and interact with stakeholders. It is important for this policy document to adopt best practices regarding interactive spaces so that both knowledge sharing dimensions manifest themselves in social media communications. Second, it is necessary to carry out staff training for the professional use of this technology for knowledge sharing. Recommendation for Researchers: Future studies should extend to more populations in different contexts to validate findings Impact on Society: This paper intends to influence practices adopted by organisations in the public sector to improve the knowledge sharing dimensions via the social media space. Future Research: Future studies may extend to public organisations in other geographical locations around Nigeria. It will be useful for studies to provide an international perspective by sampling public organisations from different countries or by comparing and contrasting the findings of other studies, specifically those from other countries. A longitudinal study should be encouraged to detect advancement or development with regards to the subject matter over a period of time.




pub

Transition to a Competitive Consultant Selection Method: A Case Study of a Public Agency in Israel

Aim/Purpose: This paper reports a case study of organizational transition from a non-competitive selection method to a novel bidding method for the selection of consultants in the Architectural and Engineering (A/E) industry. Background: Public procurement agencies are increasingly relying on external consultants for the design of construction projects. Consultant selection can be based on either competitive bidding, or quality-based criteria, or some combination between these two approaches. Methodology: Different sources of information were reviewed: internal documents, and quantitative data from the enterprise software platform (ERP). In addition, informal and unstructured interviews were conducted with relevant officials. Contribution: As there are mixed opinions in the scientific literature regarding the use of competitive bidding for the selection of consultants in the A/E industry, this paper contributes a detailed review of a transition to a competitive selection method and provides a financial and qualitative comparison between the two methods. In addition, the method implemented is novel, as it delegates most of the responsibility of hiring and managing consultants to one main contractor. Findings: While the new selection method was intended to reduce bureaucratic overload, it has unexpectedly also succeeded to reduce costs as well. Recommendations for Practitioners: It may be more efficient and profitable to adopt the selection method described in this study. Recommendation for Researchers: Similar methods can be applied to other industries successfully. Impact on Society: Our method was applied in a public organization and resulted in a better outcome, both financial and managerial. Adopting this approach can benefit public budgets. Future Research: The selection, data storage, and analysis methods are interrelated components. Future analysis of these components can help better shape the consultant selection process.




pub

Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa

Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving.