Stages of E-Government Interoperability

Author(s):  
Petter Gottschalk ◽  
Hans Solli-Saether

Improved interoperability between public organizations as well as between public and private organizations is of critical importance to make electronic government more successful (Pardo & Tayi, 2007; Wang, Song, Hamilton, & Curwell, 2007). The mobilization of electronic information across organizations has the potential of modernizing and transforming information exchanges. The current information exchanges are, however, often inefficient and error-prone (Eckman, Bennet, Kaufman, & Tenner, 2007). Exchanges of information and services are fragmented and complex, dominated by technical as well as organizational problems. High-ranking issues among the defining purposes of e government are highly agile, citizencentric, accountable, transparent, effective, and efficient government operations and services (Scholl & Klischewski, 2007). For reaching such goals, the integration of government information resources and processes, and thus the interoperation of independent information systems are essential. Yet, most integration and interoperation efforts meet serious challenges and limitations.

Author(s):  
Petter Gottschalk ◽  
Hans Solli-Sæther

Improved interoperability between public organizations as well as between public and private organizations is of critical importance to make electronic government more successful. In this chapter, stages of e-government interoperability are identified and discussed. Four stages are presented: work process stage, knowledge sharing stage, value creation stage, and strategy alignment stage.


2009 ◽  
Vol 5 (4) ◽  
pp. 14-27
Author(s):  
Petter Gottschalk

Police investigations are information intensive work processes, where information, intelligence and knowledge are important resources to solve crime cases. Often, information is needed from other police districts, customs authorities, hospitals, tax authorities, and other public as well as private organizations. Interoperability between electronic information systems can improve the efficiency and success of police investigations. This article presents the case of police investigations in terms of their value configuration and knowledge management technologies. Geographic information systems illustrate the need for information from various sources.


Author(s):  
Алла Віталіївна Хомутенко

The paper seeks to explore the nature of ensuring information support to public financial management. A range of subjects authorized to create and maintain government information systems has been identified. An overview of the systems that contribute to providing management information support to the state budget financial inflows, in particular: “Tax Block”, “Inspector”, “Electronic Check” (e-Receipt) and “ProZorro. Sales” is presented. Special focus is paid to the systems that entail information on the transactions of the State Treasury Service of Ukraine, state budget funds utilization data as well as to the transactions of state-owned business entities, such as "ProZorro public e-procurement system", "SPENDING" and "Transparent budget". The findings revealed that application of the "Automated System for computer-based pension documents processing" and the "Our Family" information system had enhanced the accuracy and transparency of cash outflows from extrabudgetary funds and facilitated the reduction of labor and working time costs of authorized managing officers. A critical review on the information systems capabilities has demonstrated the shortcomings of particular government information systems and their organizational frameworks that hamper the management performance effectiveness. The method of logical generalization was employed to provide a rationale and suggest pathways for improving information support for public financial management in Ukraine. Among the key priorities is the creation of an Electronic Government, a single information portal which will integrate the existing information systems and help to eliminate data duplication across different information systems; ensure public financial management, budget and extrabudgetary funds standardization; enhance the efficiency of financial control including the sectoral one; increase the availability of public goods and services; strengthen the responsibility of each of the authorized managing and executive officers and officials.


Author(s):  
J. R. Gil-Garcia

Over the last decade, information technologies (IT) have been considered one of the most influential ways to change organizations (Davenport, 1993; Ho, 2002; Laudon & Laudon, 2003). As early as 1986, Bozeman and Bretschneider suggested that different principles should be used when managing IT systems in public and private sector organizations (Bozeman & Bretschneider, 1986; Melitski, 2003). However, in a review of the literature, Rocheleau and Wu (2002) concluded that there remain a limited number of empirical studies that investigate whether there are differences between public and private sector organizations. Therefore, the research to-date about e-government is situated within multiple debates and draws from literature studying both public and private organizations. In fact, there is also no clear consensus about the concept of electronic government. Descriptions are emerging. For example, Holden, Norris, and Fletcher (2003) reviewed the range of definitions other authors have proposed for e-government, and suggest there are some common elements. They mention e-government is or will become electronic and not paper based and may include the Web, e-mail, fax, telephone, or other electronic means of providing information and delivering services; available 24 hours per day, 7 days per week; and the provision of information and the delivery of services (of varying types and degrees of complexity and integration). (p. 327)


2015 ◽  
Vol 719-720 ◽  
pp. 907-912
Author(s):  
Yan Li ◽  
Fen Fen Wan ◽  
Xiao Qiang Hu

With the thorough development and utilization of electronic government information resources, some phenomena are presented, such as: a large amount of data and data concentration, insufficient sharing of information resources and unsafe data exchange and so on. The construction and operation of traditional e-government data management can't meet those needs. Cloud computing is mainly aimed at intensive work load of mass data. It can allocate resources dynamically and adjust the load. This paper mainly deals with how to use cloud computing model to reduce the cost and risk of information sharing in e-government data management, so as to improve the operational efficiency of e-government data management.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1005
Author(s):  
Rakan A. Alsowail ◽  
Taher Al-Shehari

As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization’s assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders’ employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.


Sign in / Sign up

Export Citation Format

Share Document