Social Issues of Trust and Digital Government

Author(s):  
S. Marsh ◽  
A. S. Patrick

Building any online system or service that people will trust is a significant challenge. For example, consumers sometimes avoid e-commerce services over fears about their security and privacy. As a result, much research has been done to determine factors that affect users’ trust of e-commerce services (e.g., Egger, 2001; Friedman, Khan, & Howe, 2000; Riegelsberger & Sasse, 2001). Building trustable e-government services, however, presents a significantly greater challenge than e-commerce services for a number of reasons. First, government services are often covered by privacy protection legislation that may not apply to commercial services, so they will be subject to a higher level of scrutiny. Second, the nature of the information involved in an e-government transaction may be more sensitive than the information involved in a commercial transaction (Adams, 1999). Third, the nature of the information receiver is different in an e-government context (Adams, 1999). Some personal information, such as supermarket spending habits, might be relatively benign in an e-commerce situation, such as a loyalty program (supermarket points, or Air Miles, for instance), but other information such as medical records would be considered very sensitive if shared amongst all government agencies. Fourth, the consequences of a breach of privacy may be much larger in an e-government context, where, for example, premature release of economic data might have a profound effect on stock markets, affecting millions of investors (National Research Council, 2002). E-government services also involve significant privacy and security challenges because the traditional trade-offs of risks and costs cannot be applied as they can in business. In business contexts it is usually impossible to reduce the risks, for example of unauthorized access to information, or loss of or corruption of personal information, to zero and managers often have to trade-off acceptable risks against increasing costs. In the e-government context, because of the nature of the information and the high publicity, no violations of security or privacy can be considered acceptable (National Research Council, 2002). Although zero risk may be impossible to achieve, it is vital to target this ideal in an e-government service. In addition, government departments are often the major source of materials used to identify and authenticate individuals. Identification documents such as driver’s licenses and passports are issued by government agencies, so any breach in the security of these agencies can lead to significant problems. Identity theft is a growing problem worldwide, and e-government services that issue identification documents must be especially vigilant to protect against identity theft (National Research Council, 2002). Another significant challenge for e-government systems is protecting the privacy of individuals who traditionally have maintained multiple identities when interacting with the government (National Research Council, 2002). Today, a driver’s license is used when operating an automobile, a tax account number is used during financial transactions, while a government health card is used when seeking health services. With the implementation and use of e-government services it becomes possible to match these separate identities in a manner that was not being done before, and this could lead to new privacy concerns.

2008 ◽  
pp. 2905-2914
Author(s):  
Stephen Marsh ◽  
Andrew S. Patrick ◽  
Pamela Briggs

Building any online system or service that people will trust is a significant challenge. For example, consumers sometimes avoid e-commerce services over fears about their security and privacy. As a result, much research has been done to determine factors that affect users’ trust of e-commerce services (e.g., Egger, 2001; Friedman, Khan, & Howe, 2000; Riegelsberger & Sasse, 2001). Building trustable e-government services, however, presents a significantly greater challenge than e-commerce services for a number of reasons. First, government services are often covered by privacy protection legislation that may not apply to commercial services, so they will be subject to a higher level of scrutiny. Second, the nature of the information involved in an e-government transaction may be more sensitive than the information involved in a commercial transaction (Adams, 1999). Third, the nature of the information receiver is different in an e-government context (Adams, 1999). Some personal information, such as supermarket spending habits, might be relatively benign in an e-commerce situation, such as a loyalty program (supermarket points, or Air Miles, for instance), but other information such as medical records would be considered very sensitive if shared amongst all government agencies. Fourth, the consequences of a breach of privacy may be much larger in an e-government context, where, for example, premature release of economic data might have a profound effect on stock markets, affecting millions of investors (National Research Council, 2002). E-government services also involve significant privacy and security challenges because the traditional trade-offs of risks and costs cannot be applied as they can in business. In business contexts it is usually impossible to reduce the risks, for example of unauthorized access to information, or loss of or corruption of personal information, to zero and managers often have to trade-off acceptable risks against increasing costs. In the e-government context, because of the nature of the information and the high publicity, no violations of security or privacy can be considered acceptable (National Research Council, 2002). Although zero risk may be impossible to achieve, it is vital to target this ideal in an e-government service. In addition, government departments are often the major source of materials used to identify and authenticate individuals. Identification documents such as driver’s licenses and passports are issued by government agencies, so any breach in the security of these agencies can lead to significant problems. Identity theft is a growing problem worldwide, and e-government services that issue identification documents must be especially vigilant to protect against identity theft (National Research Council, 2002). Another significant challenge for e-government systems is protecting the privacy of individuals who traditionally have maintained multiple identities when interacting with the government (National Research Council, 2002). Today, a driver’s license is used when operating an automobile, a tax account number is used during financial transactions, while a government health card is used when seeking health services. With the implementation and use of e-government services it becomes possible to match these separate identities in a manner that was not being done before, and this could lead to new privacy concerns.


2015 ◽  
Vol 6 (3) ◽  
pp. 206-222 ◽  
Author(s):  
Kanda Sorn-in ◽  
Kulthida Tuamsuk ◽  
Wasu Chaopanon

Purpose – The purpose of this paper is to study the factors affecting the development of e-government by using a citizen-centric approach. Design/methodology/approach – This paper is a mixed-methods study consisting of qualitative and quantitative research. Data were collected from government agencies using a structured interview and questionnaire about e-government services. The research was collected from the people responsible for the management of an e-government project in 75 government agencies. In addition, the researcher collected data from 1,400 citizens by using an e-Survey questionnaire that grouped participants by age. Findings – By using a citizen-centric approach, the paper identified the factors affecting the development of e-government. There were five factors from the viewpoint of government agencies and citizen groups: quality of e-government services, policy and governance, information technology infrastructure, organization and economy and society. Research limitations/implications – The research covered the development patterns of e-government for services from government to citizens only. Practical implications – Seeing the importance of environmental factors for both service providers and service users would facilitate continuous improvement of e-government service provision by government agencies. Social implications – The results reflect citizens’ need for e-government services; quality is their priority. Hence, government agencies must consider the quality of the delivery of information and e-government services as they relate to the lifestyles and needs of citizens. Originality/value – The creation of knowledge from merging e-government concepts with citizen-centric principles is a modern government sector management theory. This research stresses the need for the government sector to see the need for e-government and to recognize the factors for its successful development. This means the design and development of e-government services should respond to the increasing needs of the citizens.


Author(s):  
Saswati Mukherjee ◽  
R. Geethapriya ◽  
Suba Surianarayanan

The advancement of various computer technologies has led to the migration of traditional governance to e-governance that enables the citizens to access the government services through Internet. Although, Information and Communication Technologies (ICT) act as backbone for e-governance in helping the government meet its citizens' needs through efficient service delivery, e-governance lacks the cross-agency communication as the e-services are offered by the government agencies independently. A better version of e-governance is c-governance (connected governance) in which the government agencies are connected and offer an integrated service to the citizens. Cloud is now a leading technology that enables collaboration across agencies and seamlessly integrated services. This chapter suggests the importance of adopting cloud technologies for c-governance and presents a discussion of the existing government clouds of Singapore and UK. A c-governance framework is also presented to illustrate how the cloud deployment and service models can be adopted for c-governance.


2013 ◽  
Vol 29 (2) ◽  
pp. 223-231 ◽  
Author(s):  
Kenneth Prewitt

Abstract This article, delivered as the 22nd Memorial Morris Hansen lecture, argues that the contract houses, typified by Westat, are uniquely situated in the cluster of institutions, practices, and principles that collectively constitute a bridge between scientific evidence on the one hand and public policy on the other. This cluster is defined in The Use of Science as Evidence in Public Policy as a policy enterprise that generates a form of social knowledge on which modern economies, policies, and societies depend (National Research Council 2012). The policy enterprise in the U. S. largely took shape in the first half of the twentieth century, when sample surveys and inferential statistics matured into an information system that provided reliable and timely social knowledge relevant to the nation’s policy choices. In ways described shortly, Westat and other social science organizations that respond to “request for proposals” (RFP) from the government for social data and social analysis came to occupy a unique niche. The larger question addressed is whether the policy enterprise as we know it is prepared for the tsunami beginning to encroach on its territory. Is it going to be swamped by a data tsunami that takes information from very different sources than the familiar census/survey methods?


2010 ◽  
Vol 25 (2) ◽  
pp. 126-136 ◽  
Author(s):  
William Newk-Fon Hey Tow ◽  
Peter Dell ◽  
John Venable

The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This paper presents research investigating why users of social networking websites willingly disclose personal information and what sorts of information they provide (or not). The study employed an ethnographic approach of participation in the online community and interviews of community members, combined with a quantitative survey. The findings show that users are often simply not aware of the issues or feel that the risk to them personally is very low. The paper develops a preliminary theoretical model to explain the information disclosure phenomenon. It further recommends that government agencies or social networking websites themselves conduct campaigns to inform the public of these issues and that social networking websites consider removing some facilities. The study was conducted in an Australian context and focussed on the popular Facebook website.


2020 ◽  
Vol 8 (2) ◽  
pp. 118-123
Author(s):  
Ashish Jaiswal

Digital India programme of Government of India has promoting and encouraging the usage of digital payments for the various goods and services being availed by the citizens. The Government wants to develop a Digitally Empowered economy through the cashless transactions. As far as government agencies are concerned, mobile based payment is a noteworthy development on various domains, because it is going to increase ease and productivity for both the agencies and citizens themselves. Citizens who are using the Government services are concerned of the privacy of the data and information. Government needs to evaluate the procedure from beginning to end to ensure it meets strict standards and keeps information private. Poor literacy levels are a problem with this technology. The mobile payment services have to be effective in terms of usability, cost, efficiency, interoperability and security for transactions of all categories of citizens. Mobile payments options needs to be available even on low end mobile handsets.


Author(s):  
Ramaraj Palanisamy ◽  
Bhasker Mukerji

Government is a unique actor as a provider of online public services to its citizens and enterprises. The e-citizens expect that the e-government services are safe and secure, that the privacy of the e-citizen is protected. As security and privacy are primary concerns in e-government, this chapter describes the security and privacy issues faced by the government, the sources and applications of these threats, the ways of protecting security and citizens’ personal information, and the challenges in managing the security threats. The purpose of this chapter is to provide guidelines for the administrators of state-level & federal-level e-government services and IT professionals that they need for continuous improvement of e-government security and privacy.


Author(s):  
Centre for Intellectual Property and Information Technology (CIPIT)

The Centre for Intellectual Property and Information Technology Law (CIPIT) has been studying the impact of digital identities on society.  This has included policy research on the legal and technical aspects of the national digital ID system Huduma Namba under which the Government is integrating all its identification documents. This research shows that the national digital identity system also integrates with privately issued digital identities such as mobile phone numbers and social media accounts.   We anticipate that as national digital ID uses increase, so will the linkage with private systems. This is already evident from e-government services, where payments for Government services, such as passport applications, drivers’ licences, national health insurance and hospital bills in public hospitals are made using mobile money platforms. We also appreciate that private digital ID is more developed and has more uses than national digital ID. For example, a 2019 survey, undertaken by the Central Bank of Kenya (CBK), estimates that access to financial products had risen from 26.7% in 2006 to 89% of the population in 2019. This is attributed partly to the availability of digital products such as “mobile banking, agency banking, digital finance and mobile apps”.  These products make use of personal data, which broadly falls under digital identities. This study seeks to understand the privacy implications of digital ID by looking at digital lending apps.


Author(s):  
Yogesk K. Dwivedi

The penetration of the Internet and opportunities involving information and communication technologies (ICTs) have occurred at an escalating rate within the private sector. This has caused governments and public sector organisations around the globe to become aware of their potential and consequently utilise them; thereby triggering investments in e-services (Choudrie et al., 2004a). However, the e-services offered by governments are much more than simple automation. E-services are meant to dramatically improve all areas of government activities: from democratic participation using online voting to improving the efficiency of citizen interactions with the government by providing online government services (Barc & Cordella 2004).Other countries around the globe are undertaking various e-government measures. Similar to them, the United Kingdom (UK) government is also undertaking steps that ensure it is progressing in accordance with these countries. For this purpose, the introduction and experiences of utilising a number of government services that are offered electronically via the ‘Government Gateway’ in the UK is pertinent. These e-government services include council tax bills and accounts, housing benefits, child benefit claims, carer’s allowance, jobs online, state pension forecasts, self assessment of tax and tax credits, landweb direct, and the national blood services (Government Gateway, 2004). This is in contrast to the traditional method, whereby access to government services was undertaken by the citizens visiting ‘physical, brick foundation’ locations. Therefore this novel phenomenon offers a great amount of convenience and ease for citizens’ use (Government Gateway, 2004). However, it is not known whether the citizens of the UK are aware of such services. Further, questions are still emerging concerning whether the citizens are actually adopting the newly offered services. Therefore the initial aim of this chapter is to examine citizens’ awareness and adoption of e-government initiatives, specifically the Government Gateway in the United Kingdom. Since these services have been recently introduced, an investigation is needed to study if the demographic characteristics and home Internet access are affecting the awareness and adoption of these services. Therefore the second aim of this chapter is to examine the affect of the citizens’ demographic characteristics and home Internet access on the awareness and adoption of e-government services. To fulfill these aims, this study undertook an empirical examination of the awareness and adoption of the Government Gateway amongst UK citizens. This research offers a contribution to various stakeholders including the government agencies who could require a distinction to be drawn between the adopters and non-adopters of e-government services. That is, from the results of this research the government agencies could better understand in a simpler and detailed manner, the problem of low adoption. This could allow the formulation of a strategy that promotes awareness and diffusion. The chapter begins with a brief discussion of research undertaken on the citizens’ adoption of e-government services and a brief overview of the Government Gateway and its purpose. The findings are then presented and discussed. Finally, a conclusion to the research is provided. It is important to mention that the research methodology for this chapter is already presented and discussed in previous chapters. Therefore, this chapter does not include research methodology and only presents empirical data in the form of tables.


2014 ◽  
pp. 880-892 ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Bhasker Mukerji

Government is a unique actor as a provider of online public services to its citizens and enterprises. The e-citizens expect that the e-government services are safe and secure, that the privacy of the e-citizen is protected. As security and privacy are primary concerns in e-government, this chapter describes the security and privacy issues faced by the government, the sources and applications of these threats, the ways of protecting security and citizens' personal information, and the challenges in managing the security threats. The purpose of this chapter is to provide guidelines for the administrators of state-level & federal-level e-government services and IT professionals that they need for continuous improvement of e-government security and privacy.


Sign in / Sign up

Export Citation Format

Share Document