Professor Dr. Ali M Al-Khouri (original) (raw)
Papers by Professor Dr. Ali M Al-Khouri
Program Management of Technology Endeavours, 2015
International journal of social sciences, 2007
The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries... more The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries with regards to G2C egovernment maturity. It reveals that e-government G2C initiatives in the surveyed countries in particular, and arguably around the world in general, are progressing slowly because of the lack of a trusted and secure medium to authenticate the identities of online users. The authors conclude that national ID schemes will play a major role in helping governments reap the benefits of e-government if the three advanced technologies of smart card, biometrics and public key infrastructure (PKI) are utilised to provide a reliable and trusted authentication medium for e-government services.
Proceedings of the 18th Annual International Conference, 2010
This article explores some thoughtful considerations for management related to understanding and ... more This article explores some thoughtful considerations for management related to understanding and improving the overall performance of individuals and teams in organisations. It reflects thoughts and learnings from several implementations of small and large projects in public sector. It also sheds light on various theories, tools and frameworks and how they can be used to improve overall organisational performance.
Copyright © 2013 Ali M. Al-Khouri. This is an open access article distributed under the Creative ... more Copyright © 2013 Ali M. Al-Khouri. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In the last 12 years or so, many governments have launched modern identity management systems. These systems typi-cally integrate a set of advanced and complex technologies to provide identification and authentication capabilities. The major output of such systems is smart identity cards that bind the cardholders ’ identities to their biographical data and one or more biometric characteristics. The field of government practice has been focusing on the enrolment capabilities and infrastructure rollout, with little focus on smart card applications in the public domain. This article attempts to ad-dress this area in the body of knowledge from a government view point. It explores card reader adoption opportunities in both the public and priv...
International Journal of Public Information Systems, Jan 7, 2014
The concept of federated e-identity is gaining attention worldwide in light of evolving identity ... more The concept of federated e-identity is gaining attention worldwide in light of evolving identity management challenges to streamlining access control and providing quality and convenient online services. In a federated system, participant institutions share identity attributes based on agreed-upon standards, facilitating authentication from other members of the federation and granting appropriate access to online resources. The article provides an insight into the ongoing federated e-Identity initiative in GCC countries. The aim of the initiative is to develop a trusted and secure cross-border infrastructure to authenticate and validate citizens' identities across GCC borders. Such an interoperability platform can then be used to facilitate citizens' mobility and stand as the basis for digital economy development. Current literature does not include any information about the work being conducted within GCC countries in relation to the GCC eID platform. This article thus contributes to developing a better understanding of such practices, triggers
International Journal of Innovation in the Digital Economy, 2012
Over the past decade, biometrics technology has evolved from a technology used primarily in foren... more Over the past decade, biometrics technology has evolved from a technology used primarily in forensics and a narrow scientific and technological field to an indispensable technology in public and private sectors expanding into areas calling for advanced security. Biometric technologies provide high levels of security and reliability to address requirements related to identification and verification of personal identities. In light of the ever increasing requirements for robust identity management, biometrics industry is evolving to play a central role in shaping the future economy. This article provides a comprehensive overview of biometrics technologies, its functions, areas of application, related international standards, and recent advances in the field. The second part of the article looks at the application of biometrics in the government sector worldwide, and the emerging pivotal role of biometrics in consolidating the foundations of the digital economies and sheds light on the...
Advances in Social Sciences Research, 2014
The explosion of the internet and mobile phones, as well as other rapid technological development... more The explosion of the internet and mobile phones, as well as other rapid technological developments, has significantly influenced momentous changes in the payments market. Perceived as being more efficient and less expensive, electronic payments pave the way for the development of more sophisticated digital services in both the public and the private sector. This article provides an overview of electronic payment systems and their relation to recent developments in the United Arab Emirates (UAE). It summarizes existing card-based stored-value-payment initiatives in the UAE and presents the current identity management infrastructure in the country as a potential enabler to support the development of a more comprehensive national electronic payment system.
Telematics and Informatics, 2008
This article discusses the implementation of iris recognition in improving the security of border... more This article discusses the implementation of iris recognition in improving the security of border control systems in the United Arab Emirates. The article explains the significance of the implemented solution and the advantages the government has gained to-date. The UAE deployment of iris recognition technology is currently the largest in the world, both in terms of number of Iris records enrolled (more than 840,751) and number of iris comparisons performed daily 6,225,761,155 (6.2 billion) in 'all-against-all' search mode.
Organizations in both public and private sectors are realizing the value of identity and access m... more Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing privacy protection, and connecting the diverse web of public and private sector agencies involved in the delivery of today's public service. This article provides an overview of identity and access management literature. It attempts to analyze the business drivers, trends, issues and challenges associated with the implementation of such systems. It then presents a strategic framework and an overall ecosystem for the implementation of identity and access management system in different contexts of applications. It also introduces possible strategies and solutions for the development of a f...
Digital certificates provide advanced instruments for confirming identities in electronic environ... more Digital certificates provide advanced instruments for confirming identities in electronic environments. The application of digital certificates has been gaining global acceptance both in public and private sectors. In fact, the government field has witnessed increasing adoption of cryptographic technologies to address identity management requirements in cyberspace. The purpose of this article is to provide an overview of various governmental scenarios on the usage and application of digital certificates in the United Arab Emirates. The UAE government integrated public key infrastructure (PKI) technology into its identity management infrastructure since 2003. The article also explores the UAE digital identity issuing authority's position regarding government-to-government transactions and the prospective role of digital certificates.
As government operations are moved online, information technology security services based on cryp... more As government operations are moved online, information technology security services based on cryptography become essential. Public key cryptography can play an important role in providing enhanced security services related to data protection and strong credentials for identity management. This article attempts to contribute to the limited domain of knowledge available about government practices and projects. The purpose of this article is to provide an overview of the public key infrastructure (PKI) components deployed in the United Arab Emirates national identity system. It provides a comprehensive overview of PKI technology and its primary components. It then provides an overview of the existing cryptographic components and the digital certificates stored in the PKI Applet of the smart ID card, with the purpose of shedding light on what is needed to fulfill the needs for future e-government requirements in the country.
Today’s business world is more complex and fragmented with new underlying terms and concepts. As ... more Today’s business world is more complex and fragmented with new underlying terms and concepts. As such, organizations are forced to understand the dynamics shaping today’s fuzzy world. Government organizations amid all this have been facing turbulent times to fulfill their objectives. Existing research that provides qualitative cases from governments ’ fields of practice is limited and narrowed in scope that is either of academic or commercial orientation. This article explores and presents a case study of an innovative strategic organizational development framework implemented at one of the most successful organizations in the Middle East, which is also internationally renowned for best practices in management and technology implementations. The framework demonstrates the overall organizational factors that have been considered as key drivers for organizational performance and excellence. Its primary contribution is to highlight the benefits of having the organization’s strategy as ...
The subject of connected government is coming once again to the forefront of national development... more The subject of connected government is coming once again to the forefront of national development priorities around the world. This stems from the need to address various local and global necessities in light of the changing landscape of the new digital world we live in today. In a connected government context, public service agencies are needed to act as a single enterprise so that citizens feel they are being served by one organization rather than a number of different public authorities. Identity management is considered here a fundamental pillar to enable such operating models and support single sign-on (SSO) and online identity validation capabilities for e-government and e-commerce environments. This article explores and describes the United Arab Emirates (UAE) government integration strategy with relation to keeping its national identity management infrastructure (population register) updated as life events take place. The integration strategy also aims to support federal and...
Abstract: This article presents the approach followed in the United Arab Emirates (UAE) national ... more Abstract: This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It presents how the organisation reengineered its operations to achieve its strategic objectives. It also presents some of the experienced challenges, and how they were dealt with. Some key management consideration areas were also listed for the purpose of sharing knowledge and experience in the field.
Educational Technology, 2015
Journal of Computer Science, 2007
This article looks at one of the evolving crimes of the digital age; identity theft. It argues an... more This article looks at one of the evolving crimes of the digital age; identity theft. It argues and explains that if three key technologies were implemented together namely biometrics, smart cards, and PKI, then they can deliver a robust and trusted identification and authentication infrastructure. The article concludes that such infrastructure may provide the foundation for e-government and ecommerce initiatives as it addresses the need for strong user authentication of virtual identities.
International Journal of Innovation in the Digital Economy, 2012
This article provides an overview of the literature surrounding emerging markets and the global p... more This article provides an overview of the literature surrounding emerging markets and the global paradigm shift taking place towards the development of digital economies. It provides a review of recent practices in the government sector. The article promotes the concept of developing a government based identity management infrastructure to support the progress en route for building the digital economy. In light of increasing information security threats in today’s interconnected world, the article emphasizes that only through identification and authentication capabilities, emerging markets can maintain sustainability.
Journal of Management and Strategy, 2013
Governments the world over are competing with each other to be at a leading position in the arena... more Governments the world over are competing with each other to be at a leading position in the arena of e-government. e-Government is seen as a path to modernisation and rendering more efficient and effective public sector services. Recent practices in the field have focused on bringing the government closer to the people. As such, governments worldwide adopted various government-to-citizen (G2C) e-government models in an attempt to improve and provide round the clock availability of all government public services. This article provides a review of the current e-government field with a focus on Arab countries. We present a conceptual six-staged roadmap that illustrates our account of idealisation on how Arab countries should prioritise their e-government short and mid-term efforts. It is a simplified model that represents mega functions that governments need to bear in mind when addressing the changing development needs of the globalised world we live in today. We argue that the stages of the proposed roadmap have the potential to support the development of the public sector and the emergence of the Arab bloc as strong revolutionised citizen-centric governments.
Journal of Management and Strategy, 2012
Customer Relationship Management (CRM) has grabbed the attention of both practice and research in... more Customer Relationship Management (CRM) has grabbed the attention of both practice and research in the past decade, developing into an area of major significance. The focus of the CRM concept is to build a long-term and value-added relationship for both the organisation and customers. Governments-although considered late followers compared to the private industry-have been showing growing interest in CRM systems recently to help public and government agencies track and manage relationships with their constituents. In this article, we review existing literature to provide an understanding of the field. We also present a proposed CRM framework based on literature review and practice work. The proposed framework is envisaged to act as a practical management tool that provides a holistic overview of implementation phases, components of each phase, and associated critical success factors.
Program Management of Technology Endeavours, 2015
International journal of social sciences, 2007
The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries... more The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries with regards to G2C egovernment maturity. It reveals that e-government G2C initiatives in the surveyed countries in particular, and arguably around the world in general, are progressing slowly because of the lack of a trusted and secure medium to authenticate the identities of online users. The authors conclude that national ID schemes will play a major role in helping governments reap the benefits of e-government if the three advanced technologies of smart card, biometrics and public key infrastructure (PKI) are utilised to provide a reliable and trusted authentication medium for e-government services.
Proceedings of the 18th Annual International Conference, 2010
This article explores some thoughtful considerations for management related to understanding and ... more This article explores some thoughtful considerations for management related to understanding and improving the overall performance of individuals and teams in organisations. It reflects thoughts and learnings from several implementations of small and large projects in public sector. It also sheds light on various theories, tools and frameworks and how they can be used to improve overall organisational performance.
Copyright © 2013 Ali M. Al-Khouri. This is an open access article distributed under the Creative ... more Copyright © 2013 Ali M. Al-Khouri. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In the last 12 years or so, many governments have launched modern identity management systems. These systems typi-cally integrate a set of advanced and complex technologies to provide identification and authentication capabilities. The major output of such systems is smart identity cards that bind the cardholders ’ identities to their biographical data and one or more biometric characteristics. The field of government practice has been focusing on the enrolment capabilities and infrastructure rollout, with little focus on smart card applications in the public domain. This article attempts to ad-dress this area in the body of knowledge from a government view point. It explores card reader adoption opportunities in both the public and priv...
International Journal of Public Information Systems, Jan 7, 2014
The concept of federated e-identity is gaining attention worldwide in light of evolving identity ... more The concept of federated e-identity is gaining attention worldwide in light of evolving identity management challenges to streamlining access control and providing quality and convenient online services. In a federated system, participant institutions share identity attributes based on agreed-upon standards, facilitating authentication from other members of the federation and granting appropriate access to online resources. The article provides an insight into the ongoing federated e-Identity initiative in GCC countries. The aim of the initiative is to develop a trusted and secure cross-border infrastructure to authenticate and validate citizens' identities across GCC borders. Such an interoperability platform can then be used to facilitate citizens' mobility and stand as the basis for digital economy development. Current literature does not include any information about the work being conducted within GCC countries in relation to the GCC eID platform. This article thus contributes to developing a better understanding of such practices, triggers
International Journal of Innovation in the Digital Economy, 2012
Over the past decade, biometrics technology has evolved from a technology used primarily in foren... more Over the past decade, biometrics technology has evolved from a technology used primarily in forensics and a narrow scientific and technological field to an indispensable technology in public and private sectors expanding into areas calling for advanced security. Biometric technologies provide high levels of security and reliability to address requirements related to identification and verification of personal identities. In light of the ever increasing requirements for robust identity management, biometrics industry is evolving to play a central role in shaping the future economy. This article provides a comprehensive overview of biometrics technologies, its functions, areas of application, related international standards, and recent advances in the field. The second part of the article looks at the application of biometrics in the government sector worldwide, and the emerging pivotal role of biometrics in consolidating the foundations of the digital economies and sheds light on the...
Advances in Social Sciences Research, 2014
The explosion of the internet and mobile phones, as well as other rapid technological development... more The explosion of the internet and mobile phones, as well as other rapid technological developments, has significantly influenced momentous changes in the payments market. Perceived as being more efficient and less expensive, electronic payments pave the way for the development of more sophisticated digital services in both the public and the private sector. This article provides an overview of electronic payment systems and their relation to recent developments in the United Arab Emirates (UAE). It summarizes existing card-based stored-value-payment initiatives in the UAE and presents the current identity management infrastructure in the country as a potential enabler to support the development of a more comprehensive national electronic payment system.
Telematics and Informatics, 2008
This article discusses the implementation of iris recognition in improving the security of border... more This article discusses the implementation of iris recognition in improving the security of border control systems in the United Arab Emirates. The article explains the significance of the implemented solution and the advantages the government has gained to-date. The UAE deployment of iris recognition technology is currently the largest in the world, both in terms of number of Iris records enrolled (more than 840,751) and number of iris comparisons performed daily 6,225,761,155 (6.2 billion) in 'all-against-all' search mode.
Organizations in both public and private sectors are realizing the value of identity and access m... more Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing privacy protection, and connecting the diverse web of public and private sector agencies involved in the delivery of today's public service. This article provides an overview of identity and access management literature. It attempts to analyze the business drivers, trends, issues and challenges associated with the implementation of such systems. It then presents a strategic framework and an overall ecosystem for the implementation of identity and access management system in different contexts of applications. It also introduces possible strategies and solutions for the development of a f...
Digital certificates provide advanced instruments for confirming identities in electronic environ... more Digital certificates provide advanced instruments for confirming identities in electronic environments. The application of digital certificates has been gaining global acceptance both in public and private sectors. In fact, the government field has witnessed increasing adoption of cryptographic technologies to address identity management requirements in cyberspace. The purpose of this article is to provide an overview of various governmental scenarios on the usage and application of digital certificates in the United Arab Emirates. The UAE government integrated public key infrastructure (PKI) technology into its identity management infrastructure since 2003. The article also explores the UAE digital identity issuing authority's position regarding government-to-government transactions and the prospective role of digital certificates.
As government operations are moved online, information technology security services based on cryp... more As government operations are moved online, information technology security services based on cryptography become essential. Public key cryptography can play an important role in providing enhanced security services related to data protection and strong credentials for identity management. This article attempts to contribute to the limited domain of knowledge available about government practices and projects. The purpose of this article is to provide an overview of the public key infrastructure (PKI) components deployed in the United Arab Emirates national identity system. It provides a comprehensive overview of PKI technology and its primary components. It then provides an overview of the existing cryptographic components and the digital certificates stored in the PKI Applet of the smart ID card, with the purpose of shedding light on what is needed to fulfill the needs for future e-government requirements in the country.
Today’s business world is more complex and fragmented with new underlying terms and concepts. As ... more Today’s business world is more complex and fragmented with new underlying terms and concepts. As such, organizations are forced to understand the dynamics shaping today’s fuzzy world. Government organizations amid all this have been facing turbulent times to fulfill their objectives. Existing research that provides qualitative cases from governments ’ fields of practice is limited and narrowed in scope that is either of academic or commercial orientation. This article explores and presents a case study of an innovative strategic organizational development framework implemented at one of the most successful organizations in the Middle East, which is also internationally renowned for best practices in management and technology implementations. The framework demonstrates the overall organizational factors that have been considered as key drivers for organizational performance and excellence. Its primary contribution is to highlight the benefits of having the organization’s strategy as ...
The subject of connected government is coming once again to the forefront of national development... more The subject of connected government is coming once again to the forefront of national development priorities around the world. This stems from the need to address various local and global necessities in light of the changing landscape of the new digital world we live in today. In a connected government context, public service agencies are needed to act as a single enterprise so that citizens feel they are being served by one organization rather than a number of different public authorities. Identity management is considered here a fundamental pillar to enable such operating models and support single sign-on (SSO) and online identity validation capabilities for e-government and e-commerce environments. This article explores and describes the United Arab Emirates (UAE) government integration strategy with relation to keeping its national identity management infrastructure (population register) updated as life events take place. The integration strategy also aims to support federal and...
Abstract: This article presents the approach followed in the United Arab Emirates (UAE) national ... more Abstract: This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It presents how the organisation reengineered its operations to achieve its strategic objectives. It also presents some of the experienced challenges, and how they were dealt with. Some key management consideration areas were also listed for the purpose of sharing knowledge and experience in the field.
Educational Technology, 2015
Journal of Computer Science, 2007
This article looks at one of the evolving crimes of the digital age; identity theft. It argues an... more This article looks at one of the evolving crimes of the digital age; identity theft. It argues and explains that if three key technologies were implemented together namely biometrics, smart cards, and PKI, then they can deliver a robust and trusted identification and authentication infrastructure. The article concludes that such infrastructure may provide the foundation for e-government and ecommerce initiatives as it addresses the need for strong user authentication of virtual identities.
International Journal of Innovation in the Digital Economy, 2012
This article provides an overview of the literature surrounding emerging markets and the global p... more This article provides an overview of the literature surrounding emerging markets and the global paradigm shift taking place towards the development of digital economies. It provides a review of recent practices in the government sector. The article promotes the concept of developing a government based identity management infrastructure to support the progress en route for building the digital economy. In light of increasing information security threats in today’s interconnected world, the article emphasizes that only through identification and authentication capabilities, emerging markets can maintain sustainability.
Journal of Management and Strategy, 2013
Governments the world over are competing with each other to be at a leading position in the arena... more Governments the world over are competing with each other to be at a leading position in the arena of e-government. e-Government is seen as a path to modernisation and rendering more efficient and effective public sector services. Recent practices in the field have focused on bringing the government closer to the people. As such, governments worldwide adopted various government-to-citizen (G2C) e-government models in an attempt to improve and provide round the clock availability of all government public services. This article provides a review of the current e-government field with a focus on Arab countries. We present a conceptual six-staged roadmap that illustrates our account of idealisation on how Arab countries should prioritise their e-government short and mid-term efforts. It is a simplified model that represents mega functions that governments need to bear in mind when addressing the changing development needs of the globalised world we live in today. We argue that the stages of the proposed roadmap have the potential to support the development of the public sector and the emergence of the Arab bloc as strong revolutionised citizen-centric governments.
Journal of Management and Strategy, 2012
Customer Relationship Management (CRM) has grabbed the attention of both practice and research in... more Customer Relationship Management (CRM) has grabbed the attention of both practice and research in the past decade, developing into an area of major significance. The focus of the CRM concept is to build a long-term and value-added relationship for both the organisation and customers. Governments-although considered late followers compared to the private industry-have been showing growing interest in CRM systems recently to help public and government agencies track and manage relationships with their constituents. In this article, we review existing literature to provide an understanding of the field. We also present a proposed CRM framework based on literature review and practice work. The proposed framework is envisaged to act as a practical management tool that provides a holistic overview of implementation phases, components of each phase, and associated critical success factors.
Provide an integrated and advanced personal identity management system that contribute to the tra... more Provide an integrated and advanced personal identity management system that contribute to the transformation of the government and the economy and promotes security and global competitiveness of the UAE.
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae اتحــــــــــــادية هيئــــــــة | Federal Authority Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae
The book is designed to promote understanding of conflicts in organisations, and establish how th... more The book is designed to promote understanding of conflicts in organisations, and establish how they can be handled effectively, and make them work as opportunities for improvement and constructive change.
دراسة موجزة لمجلس الوحدة الاقتصادية العربية بجامعة الدول العربية حول آثار أزمة جائحة كورونا على ا... more دراسة موجزة لمجلس الوحدة الاقتصادية العربية بجامعة الدول العربية حول آثار أزمة جائحة كورونا على الدول العربية وتقدم توصيات لمتخذي القرار وراسمي السياسات للتعامل مع تداعيات الأزمة.
يتناول الكتاب الترابط الوثيق بين الاقتصاد والمعرفة والتكنولوجيا، ويبين كيف أن الثورة الصناعية ال... more يتناول الكتاب الترابط الوثيق بين الاقتصاد والمعرفة والتكنولوجيا، ويبين كيف أن الثورة الصناعية الرابعة فرضت واقعاً جديداً وقدمت قدرات وإمكانات غير مسبوقة في ظل السرعة الكبيرة للتطورات التكنولوجية والتي باتت تغير موازين القوى الاقتصادية العالمية، وأنه وعلى الرغم من الاستثمارات الهائلة في الوطن العربي، إلا أن هناك حلقة مفقودة تستدعي الحاجة لربط هذه الاستثمارات بالمستهدفات الوطنية الاستراتيجية، وإيجاد آليات جديدة وفاعلة لقياس العوائد الاقتصادية والآثار الاجتماعية.
وتشير الدراسة إلى أن "التراجع المعرفي" في المنطقة العربية أصبح يمثل تهديداً صريحاً لركائز الأمن القومي، مشيراً إلى أن أنماط التخطيط التقليدية الحالية لن تخدم دول المنطقة في تحقيق معدلات النمو المنشودة أو حل مشكلة البطالة المتزايدة بشكل جذري، خاصة مع تنامي ممارسات الاقتصاد الرقمي والتوجه العالمي لمزيد من الاستثمار في المعرفة والتكنولوجيات الرقمية لدعم المنظومات الاقتصادية والمجتمعات الرقمية.
وتقدم الدراسة توصيات عديدة للحكومات العربية. ومن بين أهم ما خلصت له الدراسة هو تأكيدها لأهمية العمل على تطوير "منظومة اقتصادية عالمية جديدة"، يمكنها أن تقدم حلولاً للمعضلات والمخاطر المحيطة بالمنظومة الاقتصادية الحالية بكل مدارسها واتجاهاتها.
The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the k... more The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the key fields of government practice. The Series also aims to: support the mechanics of knowledge-building in the government sector and public administration; contribute to understanding the building blocks; and identify ways to move forwards.
The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the k... more The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the key fields of government practice. The Series also aims to: support the mechanics of knowledge-building in the government sector and public administration; contribute to understanding the building blocks; and identify ways to move forwards.
The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the k... more The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the key fields of government practice. The Series also aims to: support the mechanics of knowledge-building in the government sector and public administration; contribute to understanding the building blocks; and identify ways to move forwards.
The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the k... more The purpose of the Thoughts With Impact Series is to act as a knowledge repository covering the key fields of government practice. The Series also aims to: support the mechanics of knowledge-building in the government sector and public administration; contribute to understanding the building blocks; and identify ways to move forwards.
600530003 @EmiratesID emiratesiduae emiratesidauthority emiratesid.ae مؤتمرات ومحاضرات 04 ام... more 600530003 @EmiratesID emiratesiduae emiratesidauthority emiratesid.ae مؤتمرات ومحاضرات 04 املتحدة ة ّ العربي إمارات ال دولة يف ّة الهوي إدارة ل ة ّ
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae
Our Vision: To be a role model and reference point in proofing individual identity and build weal... more Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE www.emiratesid.ae