University of Maryland

New Issue of Government Information Quarterly – Volume 30, issue 1 (January 2013)

December 29th, 2012 by

The editors of Government Information Quarterly:  An International Journal of Information and Technology Management, Policies, and Practices are pleased to announce the release of Volume 30, issue 1 (January 2013).  Contents of the issue are below.

1. Editorial Board<>

2. Business perceptions and satisfaction with e-government: Findings from a Canadian survey<>
Pages 1-9
Christopher G. Reddick, Jeffrey Roy

► This paper examines business perceptions of e-government. ► It compares businesses that use and do not use the internet to contact government. ► It examines perception by businesses of government and e-government satisfaction. ► It examines business input into regulatory changes and e-government satisfaction. ► A positive attitude by business towards government increases e-government satisfaction.

3. Public e-services for agency efficiency and citizen benefit – Findings from a stakeholder centered analysis<>

Pages 10-22
Karin Axelsson, Ulf Melin, Ida Lindgren

► Agencies and citizens as e-government stakeholders are too diverse to be meaningfully addressed in e-service development. ► By adopting a multi-faceted perspective on stakeholders, public e-service development acknowledges further stakeholders. ► Our study contributes with deeper insights about a situation where stakeholder salience changes over time. ► Stakeholder centered analysis of expectations helps to develop e-services offering external service and internal efficiency.

4. Information quality and community municipal portal use<>

Pages 23-32
Brian Detlor, Maureen E. Hupfer, Umar Ruhi, Li Zhao

► The study’s theoretical model extends prior empirical work on electronic government adoption and use. ► Information quality plays an important but indirect role in influencing a person’s use of a community municipal portal. ► Data was collected from real users across five community municipal portal sites. ► Results are based on a structural equation modeling analysis on two separate cross-validated samples.

5. User acceptance of mobile e-government services: An empirical study<>

Pages 33-44
Shin-Yuan Hung, Chia-Ming Chang, Shao-Rong Kuo

► The study aims to identify determinants of user acceptance of M-Government services. ► Usefulness, ease of use, trust, and interactivity significantly influence attitude. ► External influence and interpersonal influence significantly affect subjective norm. ► Self efficacy and facilitating condition significantly influence behavioral control. ► The study leads to a better understanding of user acceptance of M-Government services.

6. Examining China’s triple-network convergence plan: Regulatory challenges and policy recommendations<>

Pages 45-55
Chun Liu

► Theoretically, this paper complements the existing research on China’s information policy, which is mostly one-shot and sector-specific, with a complete treatment of convergence policy evolution that involves both telecommunications and television. ► Practically, this paper finds that there are two remarkable characteristics in China’s convergence policy-making, namely, the causal relationship between institutional and policy change and the consistent policy objectives, which will continue to shape to future to come. ► Based on the findings, a sketch of the future regulatory regime and relevant policy recommendations are provided.

7. Social media use in the U.S. Executive branch<>

Pages 56-63
John T. Snead

► This study assesses agency social media use and public interaction with the media ► Most agencies reviewed do use social media ► Agencies experience high overall participation levels ► The public does interact with the media ► There are issues, however, with public social media participation counts

8. A conceptual approach to secure electronic elections based on patterns<>

Pages 64-73
Eduardo B. Fernandez, David L. La Red, Jos? I. Pel?ez

► We present a unified approach to elections based on a conceptual model built using software patterns. ► We showed how to analyze systematically its security threats in order to define its security requirements. ► A set of analysis patterns describe the structure and management of an election. ► Our approach to security defines the needed security mechanisms considering threats and policies.

9. A cross-cultural comparison of Kuwaiti and British citizens’ views of e-government interface quality<>

Pages 74-86
Adel M. Aladwani

► An augmented approach to analyze cross-cultural e-Government quality is introduced. ► It consists of 3 parts: a qualitative study, a field survey, and a ?persuasive quality gap? analysis. ► Perceived important, high performing, and persuasive quality characteristics were analyzed. ► Found differences between Kuwaitis and Brits’ views of interface quality features.

10. Analysis of Readex’s Serial Set MARC records: Improving the data for the library catalog<>

Pages 87-98
Daniel Draper, Naomi Lederer

► Breadth of information found in theU.S.Serial SetandAmerican State Papers► Advantages of MARC records for the digitizedSerial SetandAmerican State Papers► Purchased MARC records had problems that needed to be corrected before loading. ► Patron access influenced selection of problems that required fixing. ► Problems and solutions to them are provided for nine high-impact areas.

11. Seeking electronic information from government resources: A comparative analysis of two communities’ web searching of municipal government websites<>

Pages 99-109
Frank Lambert

► I analyzed queries submitted through two municipal government websites. ► Over 3years, how did information seeking change if at all? ? Remarkable consistencies in information needs exist between different communities. ► Information seekers believe that all information types may be sought through these sources. ► Information needs differ considerably between different levels of government.

12. The use of public computing facilities by library patrons: demography, motivations, and barriers<>

Pages 110-118
Kurt DeMaagd, Han Ei Chew, Guanxiong Huang, M. Laeeq Khan, Akshaya Sreenivasan, Robert LaRose

► A series of surveys was conducted in 12 libraries across the state of Michigan. ► The current study focuses on why library computing facilities are widely used and what are the motivations behind their use. ► Barriers and other factors that hinder usage are also discussed. ► Recommendations are made to help policy makers and library administrators promote greater use of the library’s resources. ► The study is conducted as part of a federally funded public computing center grant.

Book and Web Reviews

13. Government SecrecySusan Maret, Series: Research in Social Problems and Public Policyv. 19(2011), Emerald Group Publishing Limited, Bingley, UK 400 pp. $164.95, ISBN: 9780857243898, ISSN: 0196-1152.<>

Pages 119
Emily Keller

14. Government Technology [Website], Administered by e.Republic, 100 Blue Ravine Rd., Folsom, CA 95630. Retrieved October 5, 2012, from .

Page 120
Ryan Shepard

15. Federal Reserve Archival System for Economic Research (FRASER®). Administered by the Federal Reserve Bank of St. Louis, Research Division. One Federal Reserve Bank Plaza, Broadway and Locust Streets, St. Louis, MO 63102. Retrieved April 2, 2012, from .

Pages 121-122
Katrina Stierholz