Appendix II. Survey Factors
|
Factors influencing government cross-boundary information sharing initiatives
|
|
|---|---|
|
1
|
Focusing Event |
|
2
|
Enabling Legislation |
|
3
|
Institutional Framework |
|
4
|
Support from the Legislature |
|
5
|
Executive Involvement |
|
6
|
Enabling Leadership |
|
7
|
Formally Assigned Project Manager(s) |
|
8
|
Informal Leaders |
|
9
|
Respect for Autonomy of Participating Organizations |
|
10
|
Exercise of Authority |
|
11
|
Availability of Financial Resources |
|
12
|
Technical Infrastructure |
|
13
|
Use of External Consultants |
|
14
|
Governance Structure |
|
15
|
Common Standards |
|
16
|
Diversity of Participating Organizations and their Goals |
|
17
|
Group Past Experiences |
|
18
|
Individual Past Experiences |
|
19
|
Knowledge of Information Needs—Individual organizations |
|
20
|
Knowledge of Information Needs—Participating organizations |
|
21
|
Knowledge of Information Needs—Cross-boundary initiative |
|
22
|
Knowledge of Intra and Inter-organizational Business Processes—Own Organization, Other Organizations and Across Organizations |
|
23
|
Knowledge of Own Organization—Policies, Technologies and Management Practices |
|
24
|
Knowledge of Participating Organizations—Policies, Technologies and Management Practices |
|
25
|
Knowledge of Initiative—Policies, Technologies and Management Practices |
|
26
|
Knowledge of Environment |
|
27
|
Knowledge of Current and Emerging Technologies |
|
28
|
Technical Skills |
|
29
|
Collaboration Skills—Communication, Coordination, Collaboration and Effectiveness |
|
30
|
Boundary Object Use |
|
31
|
Clarity of Roles and Responsibilities of Participating Organizations |
|
32
|
Confidentiality and Privacy Concerns |
|
33
|
Security Concerns |
|
34
|
Political Concerns about Information Disclosure |
|
35
|
Confidentiality and Privacy Concerns |
|
36
|
Unmet Concerns |
|
37
|
Incentives |
|
38
|
Trust among Key Participants |
|
39
|
Willingness to Participate |
|
40
|
Localized, Episodic Problem Solving |
|
41
|
Appropriate and Effective Strategies |
© 2003 Center for Technology in Government
