Essays /

E Government Essay

Essay preview

++

I&S

CHALLENGES IN E-GOVERNMENT AND
SECURITY OF INFORMATION
Min-Shiang HWANG, Chun-Ta LI, Jau-Ji SHEN, and Yen-Ping CHU
Abstract: Due to the advances made in Information and Communication Technologies (ICT), e-Government users can easily use the available services from places and at time that are convenient to them through WWW browsers. To easily and securely provide the required services through Information Technology (IT) has been an important issue in e-Government. In this article, the authors propose an explicit classification of e-Government applications and some challenges and obstacles in e-Government considered from four perspectives. Finally, a comprehensive view of some critical success factors in e-Government is proposed.

Keywords: e-Government; Critical Success Factor; Internet; Security.

Introduction
The time for the electronic-based society has arrived. E-Government has received more and more importance and it can provide a non-stop government information services to citizens, enterprises, public officers, government administrations and agencies over a network. There are many issues in e-Government which need a careful examination such as security issues,1,2,3 service requirements of e-Government,4,5,6 e-Government model, 7,8,9,10,11,12,13 strategy and policy for e-Government,14,15,16,17 and domain of e-Government.18

In this article, we focus on the challenges, obstacles, and Critical Success Factors (CSFs)19 in e-Government. First of all, we have to consider all of the participants in an e-Government system. According to the involved communities, an explicit classification of e-Government applications is proposed. It provides a way to an understanding of the challenges and CSFs in e-Government. Further detailed classification of e-Government applications is provided in a subsequent section. Then the challenges and obstacles in e-Government are considered from four perspectives. The CSFs of e-Government are described next. Finally, the last section provides conclusions and outlines future research directions.

INFORMATION & SECURITY. An International Journal, Vol.15, No.1, 2004, 9-20.

10

Challenges in e-Government and Security of Information

An Explicit Classification of e-Government Applications
In order to develop an e-Government system, first, all of the users that may use the eGovernment system have to be known. Therefore, the authors have defined four basic involved communities: Government, Officeholder, Citizens, and Business. All of the applications in an e-Government system will be developed in accordance with these four communities. An explicit classification of the e-Government applications is illustrated in Figure 1 and the detailed description of each e-Government application is as given below.

Government-to-Government e-Government (G-to-G e-Gov)
Government-to-Government e-Government (G-to-G e-Gov) supports the exchange of information between the inter-organizational governmental departments, such as the system of official documents received and dispatched.

e-Government
e-Government

Government(G)
Government(G)

˙˙Administration
Administration
˙Agency
˙Agency

G-to-G
G-to-G
e-Gov
e-Gov

Citizen(C)
Citizen(C)

G-to-C
G-to-C
e-Gov
e-Gov

G-to-O
G-to-O
e-Gov
e-Gov

C-to-C
C-to-C
e-Gov
e-Gov

Officeholder(O)
Officeholder(O)

B-to-B
B-to-B
e-Gov
e-Gov

Business(B)
Business(B)

G-to-B
G-to-B
e-Gov
e-Gov

C-to-G
C-to-G
e-Gov
e-Gov

: Community
: Application
Figure 1: An Explicit Classification of e-Government Applications.

B-to-G
B-to-G
e-Gov
e-Gov

Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, and Yen-Ping Chu

11

Government-to-Officeholder e-Government (G-to-O e-Gov)
Government-to-Officeholder e-Government (G-to-O e-Gov) supports intraorganizational government officeholders, public affair organizations, and secondary organizations’ cooperative processes and procedures of public affairs. Government-to-Citizen e-Government (G-to-C e-Gov)

Citizens are aware of the services provided by the government through the communication network and use the service with their personal identities through secure mechanisms. E-Voting and e-Assistance are two examples. Government-to-Business e-Government (G-to-B e-Gov)

Businesses are aware of the services provided by the government through the communication network and use the service with a legal person’s identity through secure mechanisms. Examples are on-line customs declaration of goods or on-line clearance of goods.

Citizen-to-Citizen e-Government (C-to-C e-Gov)
In Citizen -to- Citizen e-Government, the Government acts in a mediator role for the exchange of information. Typical examples are the following ones: the Government acts as a trouble-shooter in citizens’ dispute or the Government offers temporary jobs to the victims of a disaster, so they could work in the public sector or private businesses. In this type of application the Government is a mediator that offers help in terms of manpower and information. Business-to-Business e-Government (B-to-B e-Gov)

Similar to the above-described application of C-to-C e-Government, in Business-to-Business e-Government the Government plays an intermediary role in the exchange of information. For example, the Government could invite the business to bid for contracts that contain sensitive information. These businesses might produce the country’s weaponry, such as tanks, warships, and warplanes. Citizen-to-Government e-Government (C-to-G e-Gov)

These electronic communities are formed based on the demand of the citizens (demand aggregate-driven). ...

Read more

Keywords

-07 -10 -1015 -1182 -128 -13 -131 -136 -139 -150 -155 -16 -162 -1723 -1724 -1906 -20 -2001 -2002 -2003 -207 -21 -217 -229 -265 -27 -3 -310 -349 -35 -351 -355 -397 -4 -403 -409 -511 -520 -555 -64 -65 -7 -746 -8 -9 -91 02 03 04 05 1 10 100 1007 11 117 1181 119 12 122 127 12th 13 131 13th 14 143 146 15 155 15th 16 17 1715 1719 17th 18 18731883 19 1902 1960 1980 1982 1984 1986 1988 1990 1991 1994 1995 1996 1997 1998 1999 2 20 2000 2001 2002 2003 2004 203 207 21 22 221 23 24 25 250 257 26 27 28 29 2nd 3 30 303 31 32 33 34 341 345 35 350 35th 36 36th 37 37th 38 39 392 398 4 40 402 405 41 42 43 44 45 46 47 48 5 505 507 51 548 55 58 6 632 64 7 731 79 8 9 abdelmounaam above-describ above-ment abstract ac academ accept access accord acm act ad addison addit address administr advanc advertis aeronaut affair agenc aggreg aggregate-driven agreement ahti alamito alcoreza algorithm allow also [email protected] analysi annal annual anonym appli applic apprais approach appropri april arabnia architectur arcieri arriv articl ask aspect assist associ assur athman attack attribut auction august authent author authorities/trusted avail awar award b b-to-b b-to-g b.s balboa balboa-alcoreza base basi basic benabdallah bern besid besieg best bianca bid big blind born bose boston boudriga bouguettaya brahim bredow bredow20 bring browser busi business-to-busi business-to-govern c c-to-c c-to-g ca cairo california caloyannid care carlsen carnahan case cash center centr certif certification/authentication31 chair chairman challeng chang chaoyang chapman chen cheng cheng-chi chi chia chiao chii chii-hwa chin chin-chen china chines christoph chu chun chun-ta chung chung-m citi citizen citizen-to-citizen citizen-to-govern citizenri class classif clear clearanc code cognit cohen come commerc common communic communiti comprehens compress comput computer-assist conclus confer conferenc confid consid consider construct contain contract conveni cooper copeland corpor correspond costa could council counter counti countri credibl crime critic cryptographi csf csfs csrea cultur curat current custom cybernet cyberspac cyut damag data databas datesman davi david dc de decemb declar defin degre demand demonstr den denni depart describ descript detail develop dexa dianxun dieter differ difficulti digit dimitri dimitrio direct disast discuss dispatch disput dissemin distribut diversif document domain domin dong dorothi dr dridi driven due e e-assist e-busi e-gov e-govern e-government36 e-government41 e-government42 e-government43 e-government44 e-justic e-learn e-mail e-procur e-vot e85 e85-a e86 e86-a easi easili easy-to-us ecommerc ed educ effect egovern ei eimick ein electron electronic-bas eleni elmagarmid embrac emphas emphasi empir encrypt engin english enhanc enrico enterpris environ equal equip eric essenti establish european even evid examin exampl exchang execut experi expert explan explicit f factor fail fatmi februari feng fernando field figur file final financ fine first focus follow forgeri form formosa formul foundat four framework franco fredj fu full fulli function fundament furthermor futur g g-to-b g-to-c g-to-g g-to-o galindo georg germani giovanna gisler give given good gov govern government government-to-busi government-to-citizen government-to-govern government-to-officehold government36 government41 government42 government43 government44 graduat great gritzali group growth guemara gwo gwo-chin günther h hacker hall hamid hammamet hardware/software haupt hawaii help henc heterogen hicss high high-spe higher holist hsing hua human huwei hwa hwang ict ident identif ieee ieic ifip ikonomopoulo illiter illustr imag impact import improv includ industri influenc inform informat informatica infrastructur institut integr intellig inter inter-organiz interest interfac intermediari intern internet interoper intraorganiz introduc introduct investig invit involv island issu itcc iuon iuon-chang iuon-chung j januari january/february jau jau-ji jeenick jen ji job john jose journal jr jui jui-lin juli june jungwoo justic k karen katsika kept key keyston keyword klischewski kluwer kmgov knowledg known kokolaki konstantino kosta kuang kung kuo kuo-feng l laboratori lack lai laki lambrinoudaki las last later law lay layer layn leader learn lee legal legisl legitimaci lekka level li li-hua librari lin line linz los lot low low-comput lu lynn m.s made mail make man manag mani manpow maria market martti masquerad mathemat maurizio may may/june mciver mean mechan mediat medjah meet melideo member mention messag methodolog metric michael micro micro-pay might mikko min min-shiang ming ministri mistak mobil model model.45 moulino mourad [email protected] multilevel munich must nan nardelli nation necessari need net net-meet network neural nevada new next no.1 no.12 no.2 no.4 non non-stop note noureddin näkökohtia o obstacl obtain octob offer offic officehold offici oikeudellisesta on-lin one oper opplig order organ organiz otherwis ou oudriga outlin outstand ouzzani pakistan pang parallel parti partial particip pass patronag paul payment pdpta peopl period pernul person perspect pertin peter ph.d pharmaci phase [email protected] ping pki pki-bas place play podgayetskaya point polici polit polydorou popular potenti practic press previous principl privaci privat problem procedur proceed process procur produc profession professor program project promot propag propos protect protocol provid provis psycholog public publish pursu pöysti qualifi qualiti quarter r r.o.c ralf ranjit realiz receiv recogn record reddick refer regul relat relationship relev rensburg repar report republ request requir requirements26 research respons retriev review rezgui rich ride right risk road rockart roland role rolf rudolf rui ruxandra saarenpää safe salah san saraja scheme scienc scofflaw sebastiaan secondari secret section sector secur security37 semant sensit septemb servic shen shiang shooter short shortag shuai siena signatur sihem similar simpl skill sloan social societi softwar sokrati solm solut sonntag spahni spain special specif speed spyro stage standard standortbestimmung stefano step steven still stop strategi stucki studi subject subkey subsequ success suggest summari sung support system sääntelystä ta tai taichung tainan taipei taiwan talamo tank tatyana tc11 technic technician techniqu technolog telecommun telephon temporari term text theori therefor third thirteen thorough threat thurman tietoturallisuusja tietoturvallisuud time timestamp titl tjoa tl traceabl train transact transport trauner trend troubl trouble-shoot trust tsing tung tunisia tuoma two two-phas two-stag type typic u.s unauthor understand univers universitätsverlag untrac urban us usa use user van varieti vassiliou vega victim video view virus visual viveca vol.15 volum von vote w wagner warplan warship washington watermark way weaponri web wei wei-pang weitzel well wen wen-hua wesley whitson william wimmer wireless within without wolffri work workshop worri www yan yan-chi yang yannian year yen yen-p yngstromand [email protected] yumin yunlin zaragoza