¿De verdad estamos capacitados para archivar la “república de los datos” en un entorno digital?

Tábula ◽  
2021 ◽  
pp. 81-95
Author(s):  
Luis Martínez García

Ante unas administraciones públicas que se centran en los datos, el autor se cuestiona en este texto si la profesión está capacitada –o si, al menos, así lo entiende nuestra organización–, para hacernos cargo de los datos de los sistemas de información pública; si realmente poseemos una formación suficientemente cualificada y las herramientas específicas necesarias; y si tenemos el posicionamiento adecuado en las estructuras administrativas para gestionarlos y aplicarlos de forma transversal. Facing of the public administrations that focus on data, the author queries in this text if the profession is qualified ‘or if, at least our organization understands it that way’ to take over the data of the public information systems, if we really have a sufficiently qualified training and the necessary specific tools and if we have the appropriate positioning in the administrative structures to manage and apply them in a transversal way.

Author(s):  
Nilla Rachmaningrum ◽  
Falahah Falahah ◽  
Pramayogi Sanches

[Id] Sistem informasi publik mengacu pada sistem informasi yang digunakan untuk kepentingan umum yang biasanya menyediakan berbagai tingkat solusi seperti sebagai layanan publik, informasi atau solusi teknologi. Sistem ini biasanya dikembangkan oleh pemerintah untuk memenuhi kebutuhan informasi masyarakat. Secara umum sistem ini memiliki karakteristik yaitu digunakan oleh pihak masyarakat, pemerintah dan pelaku bisnis, menyediakan data-data dengan karakteristik tertentu dan dapat diakses secara cuma-cuma oleh seluruh masyarakat. Salah satu sistem informasi publik yang pernah dibuat dan digunakan di Indonesia yaitu sistem Data Pokok Pendidikan (Dapodik) yang menyimpan berbagai informasi terkait sekolah, siswa dan guru-guru di seluruh Indonesia. Sistem ini cukup populer dan sering diakses oleh masyarakat umum, terutama untuk pencarian NISN (Nomor Induk Siswa Nasional). Namun dalam perkembangannya terjadi perubahan kebijakan di lingkungan Kementrian Pendidikan Nasional sehingga akhirnya sistem ini ditutup dan diganti oleh sistem lain yang sejenis. Untuk menjembatani adanya kebutuhan sistem informasi sejenis di ruang lingkup yang lebih kecil, dikembangkan sistem Data Pokok Pendidikan untuk tingkatan kabupaten/kota dengan mengambil contoh kasus Dinas Pendidikan Kota Padang. Analisis dan pengembangan sistem ini mengacu pada karakteristik sistem informasi publik dan diharapkan sistem ini dapat menyediakan informasi bagi masyarakat luas mengenai profil sekolah dan informasi lainnya. Pengembangan dan implementasi sistem ini memerlukan dukungan kebijakan, peraturan dan kerjasama antara berbagai pihak terkait. [En] Public information systems refer to information systems that are used for public purposes which usually provide various levels of solutions such as public services, information or technological solutions. This system is usually developed by the government to meet people's information needs. In general this system has characteristics that are used by the public, the government and business people, provide data with certain characteristics and can be accessed free of charge by the entire community. One of the public information systems that has been created and used in Indonesia is the Basic Education Data System (Dapodik) which stores various information related to schools, students and teachers throughout Indonesia. This system is quite popular and often accessed by the general public, especially for searches. NISN (National Student Identification Number). But in it development there has been a change in policy within the Ministry of National Education, so that finally the system was closed and replaced by other similar systems which have not yet completed the data content. To bridge the need for similar information systems in a smaller scope, a Basic Education Data system was developed for the district / city level by taking the case of the Padang City Education Office. Analysis and development of this system refers to the characteristics of a public information system and it is hoped that this system can provide information for the general public regarding school profiles and other information. The development and implementation of this system requires policy support, regulation and cooperation between various related parties.


1984 ◽  
Vol 8 (5) ◽  
pp. 203-212 ◽  
Author(s):  
M.C. Maguire

This article considers the general public as users of com puter based local information systems and reports on two experiments carried out in Leicester's Central Information Bureau. The first experiment, based on the ISLA System (In formation System for the Leicester Area) took place between 1979 and 1980, while the second, based on the DEVIL System (Diary of Events in Leicester) was carried out in 1983. The results of these experiments are used to support discussion on: the role of a public computer facility within an information bureau, the definition of a general public user profile and the features of hardware and software considered important in the design of human-computer interfaces for the public.


Author(s):  
Sergey E. Channov ◽  

Introduction. The article is devoted to the use of digital technologies in the field of public administration using the example of state and municipal information systems. Currently, two types of such systems can be distinguished in the Russian Federation: 1) allowing direct enforcement activities; 2) used to capture certain information. Theoretical analysis. Information systems of the first type acquire the properties of an object of complex legal relations, in which suppliers and consumers of information, government bodies, as well as other persons become participants. This entails the fact that in the implementation of public administration, the source of regulation of public relations to a certain extent becomes the program code of these information systems. Accordingly, any failures and errors in the public information system become facts of legal importance. Empirical analysis. The main risks of using information systems of the second type in public administration relate to the illegal access (or use) of information stored in their databases. The consolidation of databases containing different types of information is a serious threat. In this regard, the creation of the Unified Federal Information Register containing information about the population of the Russian Federation, provided for by the Federal Law No. 168-FZ of 08.06.2020, may lead to a large number of socially negative consequences and comes into obvious conflict with the legislation on personal data. Results. State and municipal information systems themselves can improve public administration, including reducing corruption in the country. At the same time, their reduced discretion in management decisions is not always appropriate. Accordingly, their implementation should be preceded by the analysis of the characteristics of a specific area of management, as well as the proposed use of digital technologies.


Evaluation is a key element in preparation of the business case for an IT project. Business plans include discussion of costs and benefits, performance measures, progress milestones, assessment of risk, cost estimates for alternatives, and general justification for the advocated alternative. Approaches to evaluation range from the qualitative and general to the quantitative and specific. As identified in the chapter, evaluation activities may include comparisons of the agency with “best practices,” development of performance measures and benchmarks, and cost-performance analysis.


Author(s):  
P. Partow-Navid

Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standards such as application, networking, and physical. Sophisticated technologies and methods have been developed to: • Control access to computer networks • Secure information systems with advanced cryptography and security models • Establish standards for operating systems with focus on confidentiality • Communication integrity and availability for securing different types of networks • Manage trustworthy networks and support business continuity planning, disaster recovery, and auditing The most widely recognized standards are: • In the United States: Trusted Computer System Evaluation Criteria (TCSEC). • In Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). • In Europe: Information Technology Security Evaluation Criteria (ITSEC). All of theses standards have recently been aggregated into Common Criteria standards. And yet, the information systems continue to be penetrated internally and externally at a high rate by malicious code, attacks leading to loss of processing capability (like distributed denial-of-service attack), impersonation and session hijacking (like man-in-the-middle attack), sniffing, illegal data mining, spying, and others. The problem points to three areas: technology, law, and IT administration. Even prior to the drama of 9/11, several computer laws were enacted in the USA and yet more may come in the future. Still the fundamental threats to information security, whether they originated outside the network or by the company’s insiders, are based on fundamental vulnerabilities inherent to the most common communication protocols, operating systems, hardware, application systems, and operational procedures. Among all technologies, the Internet, which originally was created for communication where trust was not a characteristic, presents the greatest source of vulnerabilities for public information systems infrastructures. Here, a threat is a probable activity, which, if realized, can cause damage to a system or create a loss of confidentiality, integrity, or availability of data. Consequently, vulnerability is a weakness in a system that can be exploited by a threat. Although, some of these attacks may ultimately lead to an organization’s financial disaster, an all-out defense against these threats may not be economically feasible. The defense actions must be focused and measured to correspond to risk assessment analysis provided by the business and IT management. That puts IT management at the helm of the information security strategy in public organizations.


2008 ◽  
pp. 2745-2754
Author(s):  
Parviz Partow-Navid ◽  
Ludwig Slusky

Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standards such as application, networking, and physical. Sophisticated technologies and methods have been developed to: • Control access to computer networks • Secure information systems with advanced cryptography and security models • Establish standards for operating systems with focus on confidentiality • Communication integrity and availability for securing different types of networks • Manage trustworthy networks and support business continuity planning, disaster recovery, and auditing The most widely recognized standards are: • In the United States: Trusted Computer System Evaluation Criteria (TCSEC). • In Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). • In Europe: Information Technology Security Evaluation Criteria (ITSEC). All of theses standards have recently been aggregated into Common Criteria standards. And yet, the information systems continue to be penetrated internally and externally at a high rate by malicious code, attacks leading to loss of processing capability (like distributed denial-of-service attack), impersonation and session hijacking (like man-in-the-middle attack), sniffing, illegal data mining, spying, and others. The problem points to three areas: technology, law, and IT administration. Even prior to the drama of 9/11, several computer laws were enacted in the USA and yet more may come in the future. Still the fundamental threats to information security, whether they originated outside the network or by the company’s insiders, are based on fundamental vulnerabilities inherent to the most common communication protocols, operating systems, hardware, application systems, and operational procedures. Among all technologies, the Internet, which originally was created for communication where trust was not a characteristic, presents the greatest source of vulnerabilities for public information systems infrastructures. Here, a threat is a probable activity, which, if realized, can cause damage to a system or create a loss of confidentiality, integrity, or availability of data. Consequently, vulnerability is a weakness in a system that can be exploited by a threat. Although, some of these attacks may ultimately lead to an organization’s financial disaster, an all-out defense against these threats may not be economically feasible. The defense actions must be focused and measured to correspond to risk assessment analysis provided by the business and IT management. That puts IT management at the helm of the information security strategy in public organizations.


Sign in / Sign up

Export Citation Format

Share Document