Modelling the Enterprise Architecture Implementation in the Public Sector using HOT-Fit Framework
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Enterprise architecture is very important to the public sector’s IT systems that are developed, organized, scaled up, maintained and strategized. Despite an extensive literature, the research of enterprise architecture is still at the early stage in public the sector and the reason to explain the acceptance, as well as the understanding of the implementation level of EA services still remains unclear. Therefore, this study examines the implementation of EA by measuring the Malaysian public sector’s influence factors of EA. Grounded by the Human-Organization-Technology (HOT-Fit) Model, this study proposes a conceptual framework by decomposing Human characteristics, Organizational characteristics and Technological characteristics as main categories in assessing the identified factors. A total of 92 respondents in the Malaysian public sector participated in this study. Structural Equation Modelling with Partial Least Square is the main statistical technique used in this study. The study has revealed that human characteristics such as knowledge and innovativeness to EA and technological characteristics such as relative advantage and complexity of EA influence its implementation by the Malaysian public sector. Based on the findings, the theoretical and practical implications of the study as well as limitations and future works are also discussed.
Authors and Affiliations
Hasimi Sallehudin, Nurhizam Safie Mohd Satar, Nur Azaliah Abu bakar, Rogis Baker, Farashazillah Yahya, Ahmad Firdause Md Fadzil
Strength of Crypto-Semantic System of Tabular Data Protection
The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres...
Open-Domain Neural Conversational Agents: The Step Towards Artificial General Intelligence
Development of conversational agents started half century ago and since then it has transformed into a technology that is accessible in various aspects in everyday life. This paper presents a survey current state-of-the-...
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
We develop an approach of key distribution protocol(KDP) proposed recently by T.Aono et al., where the security of KDP is only partly estimated in terms of eavesdropper's key bit errors. Instead we calculate the S...
(AMDC) Algorithm for wireless sensor networks in the marine environment
Data compression is known today as one of the most important enabling technologies that form the foundation of the majority of data applications and networks as we know them, including wireless sensor networks and the po...
Comparative Study of PMSG Controllers for Variable Wind Turbine Power Optimization
With a large increase in wind power generation, the direct driven Permanent Magnet Synchronous Generator is the most promising technology for variable speed operation and it also fulfills the grid requirements with high...