**5. Epilogue: Who really need IT and informatics? (The empire strikes back)**

Motto "I am not interested how you do the job, just do it" has been transferred from object oriented environment to SOA environment by simultaneous modification of late binding

The Requirements for the Legal Regulation of Commercial Relations in Cloud Computing 181

aware of himself and his possibilities but has also fallen in trap of overestimating the same. On the other hand, underestimating the role of information scientists and wrong interpretation of need for such personnel in business brought to outsourcing IT sector and

Insecurity, non-transparency, indecisiveness and many similar negative characteristics doesn't have to accompany cloud solutions but they remain as possible side effects. User coming from business system has perceived Cloud as vulnerable and "stripped" to the level where it has to provide information services precisely ensured and regulated to a level securing the legal strength. Business system's user has in Cloud realised that he has to have Information Science services completely protected by law. Only that way will they be able to reinforce themselves with required tools and backup in accelerated business and fiercer market competition. Information Science asks for law to be its companion. Information science requires law as constant associate in business making and providing information to business needs. Development of information system will demand a person in team professional enough to perform that assignment. Actually a qualitative synergy between

Batini,C. ,Scannapieco, M. ( 2006), Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)*,* Springer, ISBN-13: 978-3540331728 Frank, G.,(2008), *Defining "Cloud Services" and "Cloud Computing"".* IDC. 2008-09-23.

Fu, P., Sun, J., (2010), *Web GIS: Principles and Applications*, ESRI Press, ISBN-13: 978-

Korri, T. (2010), *Cloud computing: utility computing over the Internet*, Helsinki University of

www.cse.tkk.fi/en/publications/B/5/papers/Korri\_final.pdf/(accessed:

Malik, O., (2008), *What Makes a Cloud Computer?,* Gigaom.com. 2008-06-22. Retrieved 2010-

Markoff, J. (2008). *"Microsoft Plans 'Cloud' Operating System".* Nytimes.com. Retrieved 2011-

Mathur, P. ,Nishchal, N., (2010), *Cloud computing: New challenge to the entire computer industry,* 

Mell, P., Grance, T. (2011) "The NIST Definition of Cloud Computing (Draft)"*,* 

Miller, R., (2008), *What's In A Name? Utility vs. Cloud vs Grid*, Datacenterknowledge.com.

O'Brien, J A. (2003). *Introduction to information systems: essentials for the e-business enterprise*.

*(in Parallel Distributed and Grid Computing (PDGC), 1st International Conference, pp. 223* 

*(Recommendations of the National Institute of Standards and Technology)*. National

Kroenke, D M. (2008). *Experiencing MIS*. Prentice-Hall, Upper Saddle River

Liebow, M., (2005), *Do customers really want SOA?,* IBM, TechRepublic, ZDNet News

*– 228, ISBN: 978-1-4244-7675-6 )* Eccentex.com. Retrieved 2010-08-22

Institute of Science and Technology., Retrieved 2011-07-24.)

leaving the computer backup service such as Cloud computing.

law and information science is obligatory.

Retrieved 2010-08-22

Retrieved 2010-08-22.)

McGraw-Hill, Boston, MA

1589482456

Technology,

10.5.2010.)

08-22.)

08-20.)

Balzer , Y. (2004), Improve your SOA project plans, IBM,

**7. References** 

paradigm into a more declared weak binding paradigm. Graphic interface and object oriented paradigms have broadened possibilities for all users' categories. Programmers as user category have been significantly disburdened in their work by possibility of applying the package and libraries of final programme modes which, combined with minor modification and change, can be used in every situation imposed by concrete problem in business environment. Basic paradigms from object oriented environment have been further improved and applied in SOA environment. SOA environment as paradigm is characterised by assembly of mutually connected services. Services have minimal interdependence and constant distinction. Should all services be united in one portfolio of services and should they be made disposable to the user, all his needs should be satisfied. Projecting based on analysis of use case permits such a granularity of software solutions. It is important that user is introduced with a possibility that he can use such solutions when need emerges. That way a possibility is offered which necessarily doesn't have to be consummated, but it is important to know that it exists. Extraction of IT sector as non-core business out of business system's frame demands a different attitude towards the ICT experts so it presents them in different light.

Application of all accomplishments of good practice from the above mentioned modes of organising computer supported Information Systems through integrating all possibilities offered by Internet and Web, appreciation of users' needs and a possibility of their modification have been united in a new approach known as cloud computing. (Korri, 2006) Basic advantages of cloud computing are: reductions in duration of performance and response, lower costs of approach, decrease of risks in field of infrastructure, maintaining the level of innovations, reliability, possibility of development, safety and sustainability. Since cloud computing is proclaimed by slogan pay-for-what-you-use the fact is it represents a model similar to the one of spending electricity, fuel and water. Cloud can be public or private. Public cloud sells services unlimited respectively those services that are available with fee to anyone on the Internet. Private cloud is usually an owner of private network and data that provide services to a limited number of users. In such circumstances Information Science necessarily demands appropriate legal treatment of every service individually. Both categories of users should be maximally protected but so should be every service as a product, tool or an instrument used by both sides. Legal aspect has been maximally underlined in all levels up to a measure that it requires a special legal regulation. Service as product can lead to unwanted results that can cause certain damage to user or service applicant. Necessity of protection has been articulated through forms known as SLA and the beginning has been denoted in Cloud that has a prospect of becoming a dominant form of computer backup to business in a long term period.

#### **6. Conclusion: What can we do without IT? (Adam, why are you naked?)**

User or requestor of Information System's services has, during the time flow, been put in different relationships and different positions. Primal need of users' high specialisation in knowledge and skills within Information Science has been lost. Business systems that insisted on computer backup, approached to organisation of private IT sectors that employed such experts. Reference to such category of users has changed with the time flow. Difference in basic knowledge of Information Science among experts users and users themselves has disappeared while cognition of own possibilities has grown and user increased his knowledge of own possibilities. Final user has in such circumstances become aware of himself and his possibilities but has also fallen in trap of overestimating the same. On the other hand, underestimating the role of information scientists and wrong interpretation of need for such personnel in business brought to outsourcing IT sector and leaving the computer backup service such as Cloud computing.

Insecurity, non-transparency, indecisiveness and many similar negative characteristics doesn't have to accompany cloud solutions but they remain as possible side effects. User coming from business system has perceived Cloud as vulnerable and "stripped" to the level where it has to provide information services precisely ensured and regulated to a level securing the legal strength. Business system's user has in Cloud realised that he has to have Information Science services completely protected by law. Only that way will they be able to reinforce themselves with required tools and backup in accelerated business and fiercer market competition. Information Science asks for law to be its companion. Information science requires law as constant associate in business making and providing information to business needs. Development of information system will demand a person in team professional enough to perform that assignment. Actually a qualitative synergy between law and information science is obligatory.

#### **7. References**

180 Security Enhanced Applications for Information Systems

paradigm into a more declared weak binding paradigm. Graphic interface and object oriented paradigms have broadened possibilities for all users' categories. Programmers as user category have been significantly disburdened in their work by possibility of applying the package and libraries of final programme modes which, combined with minor modification and change, can be used in every situation imposed by concrete problem in business environment. Basic paradigms from object oriented environment have been further improved and applied in SOA environment. SOA environment as paradigm is characterised by assembly of mutually connected services. Services have minimal interdependence and constant distinction. Should all services be united in one portfolio of services and should they be made disposable to the user, all his needs should be satisfied. Projecting based on analysis of use case permits such a granularity of software solutions. It is important that user is introduced with a possibility that he can use such solutions when need emerges. That way a possibility is offered which necessarily doesn't have to be consummated, but it is important to know that it exists. Extraction of IT sector as non-core business out of business system's frame demands a different attitude towards the ICT experts so it presents them in

Application of all accomplishments of good practice from the above mentioned modes of organising computer supported Information Systems through integrating all possibilities offered by Internet and Web, appreciation of users' needs and a possibility of their modification have been united in a new approach known as cloud computing. (Korri, 2006) Basic advantages of cloud computing are: reductions in duration of performance and response, lower costs of approach, decrease of risks in field of infrastructure, maintaining the level of innovations, reliability, possibility of development, safety and sustainability. Since cloud computing is proclaimed by slogan pay-for-what-you-use the fact is it represents a model similar to the one of spending electricity, fuel and water. Cloud can be public or private. Public cloud sells services unlimited respectively those services that are available with fee to anyone on the Internet. Private cloud is usually an owner of private network and data that provide services to a limited number of users. In such circumstances Information Science necessarily demands appropriate legal treatment of every service individually. Both categories of users should be maximally protected but so should be every service as a product, tool or an instrument used by both sides. Legal aspect has been maximally underlined in all levels up to a measure that it requires a special legal regulation. Service as product can lead to unwanted results that can cause certain damage to user or service applicant. Necessity of protection has been articulated through forms known as SLA and the beginning has been denoted in Cloud that has a prospect of becoming a dominant

form of computer backup to business in a long term period.

**6. Conclusion: What can we do without IT? (Adam, why are you naked?)** 

User or requestor of Information System's services has, during the time flow, been put in different relationships and different positions. Primal need of users' high specialisation in knowledge and skills within Information Science has been lost. Business systems that insisted on computer backup, approached to organisation of private IT sectors that employed such experts. Reference to such category of users has changed with the time flow. Difference in basic knowledge of Information Science among experts users and users themselves has disappeared while cognition of own possibilities has grown and user increased his knowledge of own possibilities. Final user has in such circumstances become

different light.

Balzer , Y. (2004), Improve your SOA project plans, IBM,


www.cse.tkk.fi/en/publications/B/5/papers/Korri\_final.pdf/(accessed: 10.5.2010.)


**10**

**Developing a Theoretical Framework for the** 

Mobile devices have become the world's most common means of interpersonal communication; and, the growing marketplace for new software, or "apps", enriches an already burgeoning array of purposes to which mobile technology can be lent. We are thus witnessing the advent of conditions for a range of mobile technology enabled information systems. According to the latest statistics produced by the Central Intelligence Agency (CIA), there were 5.3 billion mobile subscriptions worldwide in 2010 out of a world population of about 7 billion people (World Fact Book 2011). With the advancements in mobile technologies, several governments have started looking to provide their services via wireless and mobile devices. Mobile government (m-government) is a new delivery channel using Information and Communication Technology to deliver and improve government services that complements current e-government (Antovski and Gusev 2005). Currently, a number of m-government applications exist in several countries around the world. With the growth of m-government services, the importance of security for its acceptance and adoption has been noted in many studies (NECCC 2001; Al-khamayseh et al. 2006; Clarke and Furnell 2005, 2007). Requirements for user acceptance lead to a greater need for user and government authentication to protect data, services, and the promotion of public trust. The negative security perception is a serious issue that citizens have regarding the use of mobile services which may affect their adoption of the technology for critical applications

This chapter will describe an enquiry into how biometric technology, which can provide reliable user authentication, can play an integral role in providing secure m-government services. We use Grounded Theory methodology to understand reality from the point of view of the participants including mobile users, service providers, and network operators in order to develop a substantive theory for the adoption of biometric authentication in mgovernment security. In the field of information systems, Urquhart et al. (2009) indicated that Grounded Theory has been proved to be extremely useful in this field which led them

to recommend its application to help generate theories in information systems.

**1. Introduction** 

(Chang and Kannan 2002).

**Adoption of Biometrics in M-Government** 

**Applications Using Grounded Theory** 

Thamer Alhussain1 and Steve Drew2

*1King Faisal University, 2Griffith University, 1Saudi Arabia 2Australia* 

