Security, Sovereignty, and Continental Interoperability

2011 ◽  
pp. 153-176
Author(s):  
Jeffrey Roy

In an era of digital government, citizen-centric governance is a central aim, one that is often predicated on more efficient and responsive service owed, in large part, to greater digital connectivity internally (i.e., to share information in new manners), as well as externally (i.e., to gather information and reach out to citizens and stakeholders). Antiterrorism efforts accentuate this focus, albeit with a very different set of aims. Governments have been quick to establish new antiterrorism and homeland security measures that create new and expanded capacities for gathering, analyzing, and sharing information, both within governments and across governments and other sectors, notably the private sector.

2008 ◽  
pp. 1560-1564
Author(s):  
Chang-Tsun Li

Pervasive services of virtual communities and digital governments are achievable only if trust, privacy and security can be secured and strengthened. To meet these requirements, mechanisms, which provide secure management of information and facilities without compromising privacy and civil rights, have to be devised. The success of such mechanisms relies on effective identity authentication. While traditional security measures such as PINs and passwords may be forgotten, stolen or cracked, biometrics provides authentication mechanisms based on unique human physiological and behavioral characteristics that can be used to identify an individual or authenticate the claimed identity of an individual, but cannot be easily duplicated or forged. Typical characteristics include but are not limited to fingerprint, face, iris, hand geometry, palm, voice pattern, signature, keystroke dynamics and so forth. Moreover, in the light of homeland security, biometrics has become a powerful measure in the government’s fight against identity fraud, illegal immigration, illegal workers and terrorism. Biometrics is also useful in preventing abuses of public health services and other government entitlement.


2011 ◽  
pp. 1354-1363
Author(s):  
Hans de Bruijn ◽  
Marieke Koopmans-van Berlo

In recent years, there has been a significant rise in “e-enforcement.” E-enforcement is the use of electronic tools in law enforcement. In this article, we consider two new forms of e-enforcement which have recently been introduced in Europe. These are Weigh in Motion with Video (WIM-Vid) and the digital tachograph. WIM-Vid is a system involving sensors in the road and cameras in order to register overloading of heavy goods vehicles. WIM-Vid was developed and implemented in the Netherlands and is currently attracting international attention. The digital tachograph replaces the analogue tachograph in all heavy goods vehicles within the European Union. The machine registers drivers’ driving and rest times. In this article, we focus on the special position of the clients of e-enforcement, the regulatees. Although e-enforcement is a form of e-government or digital government, the position of the client is quite distinct. Many definitions describe e-government in terms of service delivery (Chen, 2002; Devadoss, Pan, & Huang, 2002; Finger & Pécaud, 2003; Hiller & Belanger, 2001; Ho, 2002; Moon, 2002). These descriptions feature the concept of customer focus (Devadoss et al., 2002; Finger & Pécaud, 2003; Ho, 2002). The purpose of e-government should be to satisfy these customers, whether they are ordinary citizens or parties in private sector (Finger & Pécaud, 2003). The clients of enforcement, however, are offenders or potential offenders. These clients are characterized by the fact that they do not want the service and generally exhibit uncooperative behaviour (Alford, 2002). They may, for example, actively evade the “service” of enforcement, or commit information fraud (Hawkins, 1984). In this article we will see what the distinct position of the clients of enforcement means for the effects of e-enforcement.


Author(s):  
C. C. Hinnant ◽  
S. B. Sawyer

The rapid adoption of computer networks, such as the Internet and the World Wide Web (WWW), within various segments of society has spurred an increased interest in using such technologies to enhance the performance of organizations in both the public and private sectors. While private sector organizations now commonly employ electronic commerce, or e-commerce, strategies to either augment existing business activities or cultivate new groups of customers, organizations at all levels of government have also begun to pay renewed attention to the prospects of using new forms of information and communication technology (ICT) in order to improve the production and delivery of services. As with many technologies, the increased use of ICT by government was in response not only to the increased use of ICT by government stakeholders, such as citizens or businesses, but also in response to a growing call for governmental reform during the 1990s. As public organizations at the federal, state, and even local level began to initiate organizational reforms that sought to bring private sector norms to government, they often sought to employ ICT as means to increase efficiencies and organizational coordination (Gore, 1998; Osborne & Gaebler, 1993). Such attempts to reform the operations of public organizations were a key factor in promoting an increased interest in use of new forms of ICT (Fountain, 2001). This growing focus on the broader use of ICT by public organizations came to be known as digital government. The term, digital government, grew to mean the development, adoption, and use of ICT within a public organization’s internal information systems, as well as the use of ICT to enhance an organization’s interaction with external stakeholders such as private-sector vendors, interest groups, or individual citizens. Some scholars more specifically characterize this broader use of ICT by public organizations according to its intended purpose. Electronic government, or e-government, has often been used to describe the use of ICT by public organizations to provide programmatic information or services to citizens and other stakeholders (Watson & Mundy, 2001). For example, providing an online method through which citizens could conduct financial transactions, such as tax or license payments, would be a typical e-government activity. Other uses of ICT include the promotion of various types of political activity and are often described as electronic politics, or e-politics. These types of ICT-based activities are often characterized as those that may influence citizens’ knowledge of, or participation in, the political processes. For instance, the ability of an elected body of government, such as a state legislature, to put information about proposed legislation online for public comment or to actually allow citizens to contact members of the legislature directly would be a simple example of e-politics. However, ICT is not a panacea for every organizational challenge. ICT can introduce additional challenges to the organization. For example, the increased attention on employing ICT to achieve agency goals has also brought to the forefront the potential difficulty in successfully developing large-scale ICT systems within U.S. government agencies. For example, the Federal Bureau of Investigation’s (FBI) recent announcement that it may have to scrap its project to develop a Virtual Case File system that was estimated to cost $170 million (Freiden, 2005). The adoption of new ICT is often marked by setbacks or failures to meet expected project goals, and this characteristic is certainly not limited to public organizations. However, adherence to public sector norms of openness and transparency often means that when significant problems do occur, they happen within view of the public. More significantly, such examples highlight the difficulty of managing the development and adoption of large-scale ICT systems within the public sector. However conceptualized or defined, the development, adoption, and use of ICT by public organizations is a phenomena oriented around the use of technology with the intended purpose of initiating change in an organization’s technical and social structure. Since the development and adoption of new ICT, or new ways of employing existing ICT, are necessarily concerned with employing new technologies or social practices to accomplish an organizational goal, they meet the basic definition of technological innovations (Rogers, 1995; Tornatsky & Fleischer, 1990). If public organizations are to improve their ability to adopt and implement new ICT, they should better understand the lessons and issues highlighted by a broader literature concerning technological innovation.


Author(s):  
Charles C. Hinnant ◽  
Steve Sawyer

Since the mid-1990s, adoption of wide-area computer networks, such as the Internet and the World Wide Web (WWW), by the public, educational institutions and private sector organizations has helped spur an interest in using these new Information and Communication Technologies (ICT) as a means to increase the efficiency and effectiveness of organizational processes. Private sector firms have focused on using Internet-based technologies, especially the browser-based technologies of the WWW, as a means to conduct business transactions. The use of such electronic transmission technologies in carrying out business activities has generally been dubbed electronic commerce, or e-commerce (Schneider, 2003). Attempts to reinvent public organizations in the United States during the 1990s were heavily grounded in the belief that the adoption of new forms of ICT will streamline both service generation and delivery (Osborne & Gaebler, 1993; Gore, 1993). Some government actors and observers, such as the National Science Foundation, have more recently referred to the overall use of ICT to carry out the activities of government institutions as digital government. The term digital government has in many respects grown to refer to the development, adoption or use of ICT as a key component of a public organization’s internal information and control systems, as well as any use of ICT to facilitate interaction with external stakeholders. Some scholars have attempted to examine how governments have used ICT systems, such as the Internet and WWW, as a means to facilitate interactions with citizens and other stakeholders in an attempt to foster democratic processes via electronic media. These activities have been called electronic democracy, or e-democracy. This broad concept is then usually subdivided into two subsets of activities, electronic politics and electronic government. Electronic politics, or e-politics, centers on activities that facilitate civic awareness of political processes, as well as the ability of citizens to participate in those processes. Electronic government, or e-government, includes the use of ICT by government agencies to provide programmatic information and services to citizens and other stakeholders (Watson & Mundy, 2001).


2020 ◽  
Vol 18 (2) ◽  
pp. 231-243
Author(s):  
Emma Knight ◽  
Alex Gekker

Recent technological advancements in surveillance and data analysis software have drastically transformed how the United States manages its immigration and national security systems. In particular, an increased emphasis on information sharing and predictive threat modeling following the terrorist attacks of September 11, 2001, has prompted agencies such as the Department of Homeland Security to acquire powerful data analysis software from private sector vendors, including those in Silicon Valley. However, the impacts of these private sector technologies, especially in the context of privacy rights and civil liberties, are not yet fully understood. This article interrogates those potential impacts, particularly on the lives of immigrants, by analyzing the relational database system Investigative Case Management (ICM), which is used extensively by Immigration and Customs Enforcement (ICE) to track, manage, and enforce federal immigration policy. As a theoretical framework, the we use Benjamin Bratton’s concept of the “interfacial regime,” or the layered assemblages of interfaces that exist in modern networked ICT infrastructures. By conducting a document analysis, we attempt to visually situate ICM within the federal government’s larger interfacial regime that is composed by various intertwined databases both within and outside the government’s realm of management. Furthermore, we question and critique the role ICM plays in surveilling and governing the lives of immigrants and citizens alike.


2019 ◽  
Vol 5 ◽  
pp. 237802311985682 ◽  
Author(s):  
Murat Haner ◽  
Melissa M. Sloan ◽  
Francis T. Cullen ◽  
Teresa C. Kulig ◽  
Cheryl Lero Jonson

In the era of 9/11, terrorist attacks occur with sufficient frequency and lethality to constitute a realistic threat to the well-being of the American public. Sensing this concern, politicians emphasize the threat of violent attacks to advance a platform of making public safety a priority. In this context, the authors assess the extent, sources, and emotional impact of the public’s concern about terrorism. On the basis of a national survey of 1,000 Americans, the authors examine levels of fear of a terrorist attack and worry about terrorism relative to other potential harms. They also determine whether concern about terrorism translates into support for homeland security measures that target Muslims. Of the predictors in the authors’ models, gender, religiosity, and psychological distress were most consistently associated with fear of terrorism and worry about being a victim of a terrorist attack. Structural equation modeling demonstrated that terrorism-related fear and worry predict support for anti-Muslim policies.


2017 ◽  
Vol 25 (1) ◽  
pp. 103-122 ◽  
Author(s):  
Valerie Priscilla Goby ◽  
Hamad Mohammed Ahmad Ali ◽  
Mohammed Ahmad Abdulwahed Lanjawi ◽  
Khalil Ibrahim Mohammed Ahmad Al Haddad

Purpose The aim of this study is to conduct an initial investigation of information sharing between the vast number of expatriate employees and the small minority of local employees in Dubai’s private sector workforce. Research on the impact of the workforce localization policy has highlighted the frequent marginalization of locals within the expatriate-dominated private sector. One form of this is the reluctance of expatriates to share information with local recruits, and the authors conducted this study to assess the reality and extent of this phenomenon. Design/methodology/approach The authors designed a brief interview survey to probe how Emirati employees secure workplace information and whether they experience information withholding on the part of expatriate colleagues. The authors also explored whether any such experience impacts on their attitudes to working in the private sector since this is a key factor in the success of the localization policy. Complete responses were received from 0.9 per cent of the total local private sector workforce. Findings A notable lack of information sharing emerged with 58 per cent of respondents reporting their expatriate colleagues’ and superiors’ reluctance to share information with them, and 63 per cent describing experiences of discriminatory behavior. Research limitations/implications The authors identify key cultural and communication issues relating to localization within Dubai’s multicultural workforce. These include the broader cultural factors that determine how Emiratis conceptualize information sharing. Future research can pursue this issue to help inform the development of supportive information sharing practices. Such practices are an essential part of the creation of a diversity climate, which is necessary to sustain localization. Originality/value This study is a pioneering attempt to empirically investigate the information sharing practices that Emirati private sector employees experience. It suggests that the exclusion of citizens from the workplace through practices such as “ghost Emiratization” reverberates in the workplace through a lack of information sharing.


2014 ◽  
Author(s):  
Chi-Jen Lee ◽  
Cheng-Hsiung Lu ◽  
Lucia H. Lee

Author(s):  
C. E. Passaris

The information age of the 21st century has transformed the economic, social, and political landscape in a profound and indelible manner. It also has changed the role and functions of government and redefined the scope and substance of good governance. Never before in human history has the pace of structural change been more pervasive, rapid, and global in its context. The information age has precipitated profound structural changes in the economic landscape and has given birth to the new economy. The new global economy is composed of a trilogy of interactive forces that include globalization, trade liberalization, and the information technology and communications revolution. Globalization has melted national borders, free trade has enhanced economic integration, and the information and communications revolution has made geography and time irrelevant (Passaris, 2001). Immigration has taken on a new perspective in the context of globalization. There is no denying that the spread of Internet-based technologies throughout society has become the dominant economic reality of the 21st century. E-economy—the use of information and communication technologies for product and process innovation across all sectors of the economy—has emerged as the primary engine of productivity and growth for the global economy. In large part due to advances in information and communications technologies, the role of international borders in this globalized economy has been transformed from the traditional geographical frontiers to virtual economic communities. Innovations in transportation and information and communications technology also has impacted immigration flows and made the world, in the phrase coined by Marshall McLuhan (1988), truly a “global village”. Borders have become less relevant for digital content communications and transactions. Cyberspace has no natural demarcations or border patrols. Indeed, knowledge-based products, such as software, games, and music, cross borders without impediment and with relative ease (Passaris, 2003). The advent of the information age has had a profound impact on the nature and scope of e-government and has given birth to the digital government of the 21st century. In particular, the interface between government and immigration management has been redesigned and restructured in terms of access to immigration information and application forms, the processing of immigration applicants for admission, enforcement of security measures and the prevention of terrorist infiltration, and the time line for adjudicating immigration applications, to name just a few of the significant changes to the contemporary process by which the governments of immigrant-receiving countries enforce their immigration policies.


Sign in / Sign up

Export Citation Format

Share Document